Detecting and Mitigating HX-DoS attacks
against Cloud Web Services
Ashley Chonka, Member, IEEE and Jemal Abawajy, Senior Member, IEEE
—————————— ——————————
Abstract— Cyber-Physical Systems allow for the
interaction of the cyber world and physical worlds using
as a central service called Cloud Web Services. Cloud
Web Services can sit well within three models of Cyber-
Physical Systems, Software-as-a-Service (SaaS),
Platform-as-a-Service (PaaS), and Infrastructure-as-a-
Service (IaaS). With any Cyber-Physical system use
Cloud Web Services it inherits a security problem, the
HX-DoS attack. HX-DoS attack is a combination of
HTTP and XML messages that are intentionally sent to
flood and destroy the communication channel of the
cloud service provider. The relevance of this research is
that TCP/IP flood attacks are a common problem and a
lot of research to mitigate them has previously been
discussed. But HTTP denial of service and XML denial
of service problem has only been addressed in a few
papers. In this paper, we get closer to closing this gap on
this problem with our new defence system called Pre-
Decision, Advance Decision, Learning System (ENDER).
In our previous experiments using our Cloud Protector,
we were successful at detecting and mitigate 91% with a
9% false positive of HX-DoS attack traffic. In this paper,
ENDER was able to improve upon this result by being
trained and tested on the same data, but with a greater
result of 99% detection and 1% false positive.
Index Terms— Cyber-Physical Systems, Cloud
Security, HX-Denial of Service Attacks.
1. Introduction
PS can integrate computing and communication
capabilities with monitoring and control of entities
in the physical world. These systems are usually
composed by a set of networked agents, including:
sensors, actuators, control processing units, and
communication devices (see Figure 1.). For example,
CPS applications include those that: sense and respond to
change in the environment such as forest fires,
earthquakes and glacial slides. CPS can also be used to
help utilities services such as water and traffic
management systems.
Cloud computing systems can be characterized as
Software-as-a-Service (SaaS), Platform-as-a-Service
(PaaS), and Infrastructure-as-a-Service (IaaS) [1]. PaaS
and IaaS are viable architectures that can be implemented
and applied to CPS. IaaS applications provide system
infrastructure as a service, which can allocate physical
resources to serve their application’s needs through
programs. An example of IaaS applications can be found
in Amazon’s Elastic Compute Cloud (EC2). EC2 allows
developers to allocate any number of systems to their
applications through API calls. PaaS applications provide
a platform environment rather then Infrastructure
environment. PaaS applications are best shown using the
Google App Engine (GAE). GAE allows for an instance
of a machine that is not a physical machine. For example,
Java Virtual Machine (JVM) can be run on a particular
server that can be spread through google’s multiple
physical systems. SaaS are not actually compatible with
CPS system without a framework and so can be currently
applied [2].
A Distributed Denial of Services (DDoS) attack is
usually defined as two or more machines attacking
another machine with a flood of messages to a point
where it can only handle a few requests at a time or
alternatively the system totally collapses [3-11]. The main
thrust of current research on DDoS defence has been in
detection [5][6][7], mitigation [8][9] and filtering
[10][11][12] at the TCP/IP layer. But defences at the
Application layer, where majority of communication
between cloud web services is taken place has only
minimal area of research [13][24][25][29]. In our
previous work [13], we started to close this gap on this
problem by exploring a new form of DDoS attacks called
a HyperText Transport Protocol (HTTP) and Extensible
Mark-up Language (XML) Denial of Service (DoS)
attack or HX-DoS attack. Our results show that we were
able to detect and mitigate 91% of these attack messages
with our cloud protector.
C
————————————————
A. Chonka and J.Abawajy are with the School of Information Technology,
Deakin University, Waurn Ponds, VIC, 3220, Australia, E-mail:
chonka@deakin.edu.au and jemal.abawajy@deakin.edu.au
2012 15th International Conference on Network-Based Information Systems
978-0-7695-4779-4/12 $26.00 © 2012 IEEE
DOI 10.1109/NBiS.2012.146
429