A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
This paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2020-01-01
|
Series: | Security and Communication Networks |
Online Access: | http://dx.doi.org/10.1155/2020/8873258 |
id |
doaj-933579925506435c988434b338d030dd |
---|---|
record_format |
Article |
spelling |
doaj-933579925506435c988434b338d030dd2020-11-25T02:50:11ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88732588873258A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the CloudHussain M. J. Almohri0Mohammad Almutawa1Mahmoud Alawadh2Karim Elish3Department of Computer Science, Kuwait University, Kuwait City, KuwaitDepartment of Computer Science, Kuwait University, Kuwait City, KuwaitDepartment of Computer Science, Kuwait University, Kuwait City, KuwaitDepartment of Computer Science, Florida Polytechnic University, Lakeland, USAThis paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of initial line of defense services receive new client requests, execute an algorithm to assign them to a proxy server, and reply back with the address of the chosen proxy server. The bootstrapping protocol only reveals one proxy address to each client, maintaining the obscurity of the addresses for other proxy servers. Hiding the addresses of proxy servers aims to lower the likelihood that a proxy server becomes the victim of a denial-of-service (DoS) attack. Existing works address this problem by requiring the solution of computationally intensive puzzles from prospective clients. This solution slows the progression of attacks as well as new clients. This paper presents an alternative idea by observing that limited capacity of handling initial network requests is the primary cause of denial-of-service attacks. Thus, the suggested alternative is to utilize cost-effective high-capacity networks to handle client bootstrapping, thus thwarting attacks on the initial line of defense. The prototype implementation of the protocol using Google’s firebase demonstrates the proof of concept for web services that receive network requests from clients on mobile devices.http://dx.doi.org/10.1155/2020/8873258 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Hussain M. J. Almohri Mohammad Almutawa Mahmoud Alawadh Karim Elish |
spellingShingle |
Hussain M. J. Almohri Mohammad Almutawa Mahmoud Alawadh Karim Elish A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud Security and Communication Networks |
author_facet |
Hussain M. J. Almohri Mohammad Almutawa Mahmoud Alawadh Karim Elish |
author_sort |
Hussain M. J. Almohri |
title |
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud |
title_short |
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud |
title_full |
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud |
title_fullStr |
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud |
title_full_unstemmed |
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud |
title_sort |
client bootstrapping protocol for dos attack mitigation on entry point services in the cloud |
publisher |
Hindawi-Wiley |
series |
Security and Communication Networks |
issn |
1939-0114 1939-0122 |
publishDate |
2020-01-01 |
description |
This paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of initial line of defense services receive new client requests, execute an algorithm to assign them to a proxy server, and reply back with the address of the chosen proxy server. The bootstrapping protocol only reveals one proxy address to each client, maintaining the obscurity of the addresses for other proxy servers. Hiding the addresses of proxy servers aims to lower the likelihood that a proxy server becomes the victim of a denial-of-service (DoS) attack. Existing works address this problem by requiring the solution of computationally intensive puzzles from prospective clients. This solution slows the progression of attacks as well as new clients. This paper presents an alternative idea by observing that limited capacity of handling initial network requests is the primary cause of denial-of-service attacks. Thus, the suggested alternative is to utilize cost-effective high-capacity networks to handle client bootstrapping, thus thwarting attacks on the initial line of defense. The prototype implementation of the protocol using Google’s firebase demonstrates the proof of concept for web services that receive network requests from clients on mobile devices. |
url |
http://dx.doi.org/10.1155/2020/8873258 |
work_keys_str_mv |
AT hussainmjalmohri aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT mohammadalmutawa aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT mahmoudalawadh aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT karimelish aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT hussainmjalmohri clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT mohammadalmutawa clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT mahmoudalawadh clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud AT karimelish clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud |
_version_ |
1715374035804618752 |