Entropy‐based denial‐of‐service attack detection in cloud data center

Cloud data centers today usually lack network resource isolation. Meanwhile, it is easy to deploy and terminate large number of malicious virtual machines in a few seconds, while the administrator is probably difficult to identify these malicious virtual machines immediately. These features open doors for attackers to launch denial‐of‐service (DoS) attacks that target at degrading the quality of cloud service. This paper studies an attack scenario that malicious tenants use cloud resources to launch DoS attack targeting at data center subnets. Unlike traditional data flow‐based detections, which heavily depend on the pattern of data flows, we propose an approach that takes advantage of virtual machine status including CPU usage and network usage to identify the attack. We notice that malicious virtual machines exhibit similar status patterns when attack is launched. Based on this observation, information entropy is applied in monitoring the status of virtual machines to identify the attack behaviors. We conduct our experiments in the campus‐wide data center, and the results show our detection system can promptly and accurately response to DoS attacks. Copyright © 2015 John Wiley & Sons, Ltd.

[1]  T. S. Eugene Ng,et al.  The Impact of Virtualization on Network Performance of Amazon EC2 Data Center , 2010, 2010 Proceedings IEEE INFOCOM.

[2]  Alina Madalina Lonea,et al.  Detecting DDoS Attacks in Cloud Computing Environment , 2012, Int. J. Comput. Commun. Control.

[3]  Yanpei Chen,et al.  What's New About Cloud Computing Security? , 2010 .

[4]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[5]  Huan Liu,et al.  A new form of DOS attack in a cloud and its avoidance mechanism , 2010, CCSW '10.

[6]  William H. Press,et al.  Numerical Recipes 3rd Edition: The Art of Scientific Computing , 2007 .

[7]  Qiang Cao,et al.  BigPi : Sharing Link Pools in Cloud Networks , 2013 .

[8]  Amin Vahdat,et al.  A scalable, commodity data center network architecture , 2008, SIGCOMM '08.

[9]  Xiaowei Yang,et al.  CloudCmp: comparing public cloud providers , 2010, IMC '10.

[10]  Albert G. Greenberg,et al.  The cost of a cloud: research problems in data center networks , 2008, CCRV.

[11]  Christian E. Hopps,et al.  Analysis of an Equal-Cost Multi-Path Algorithm , 2000, RFC.

[12]  Dhiren R. Patel,et al.  A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing , 2013, 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[13]  Peng Zhang,et al.  Collaborative network security in multi-tenant data center for cloud computing , 2014 .

[14]  Song Guo,et al.  Can We Beat DDoS Attacks in Clouds? , 2014, IEEE Transactions on Parallel and Distributed Systems.

[15]  Hai Jin,et al.  Falloc: Fair network bandwidth allocation in IaaS datacenters via a bargaining game approach , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[16]  Xin Jiang,et al.  Cloud computing-based forensic analysis for collaborative network security management system , 2013 .

[17]  I. Stoica,et al.  FairCloud: sharing the network in cloud computing , 2011, CCRV.

[18]  Wanlei Zhou,et al.  Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..

[19]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[20]  Radu State,et al.  BotCloud: Detecting botnets using MapReduce , 2011, 2011 IEEE International Workshop on Information Forensics and Security.

[21]  Vasileios Pappas,et al.  Improving the Scalability of Data Center Networks with Traffic-aware Virtual Machine Placement , 2010, 2010 Proceedings IEEE INFOCOM.

[22]  Zhu Youchan,et al.  The solution of DDOS attack based on multi-agent , 2010, 2010 International Conference on Educational and Information Technology.

[23]  Wanlei Zhou,et al.  Traceback of DDoS Attacks Using Entropy Variations , 2011, IEEE Transactions on Parallel and Distributed Systems.