A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud

This paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of...

Full description

Bibliographic Details
Main Authors: Hussain M. J. Almohri, Mohammad Almutawa, Mahmoud Alawadh, Karim Elish
Format: Article
Language:English
Published: Hindawi-Wiley 2020-01-01
Series:Security and Communication Networks
Online Access:http://dx.doi.org/10.1155/2020/8873258
id doaj-933579925506435c988434b338d030dd
record_format Article
spelling doaj-933579925506435c988434b338d030dd2020-11-25T02:50:11ZengHindawi-WileySecurity and Communication Networks1939-01141939-01222020-01-01202010.1155/2020/88732588873258A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the CloudHussain M. J. Almohri0Mohammad Almutawa1Mahmoud Alawadh2Karim Elish3Department of Computer Science, Kuwait University, Kuwait City, KuwaitDepartment of Computer Science, Kuwait University, Kuwait City, KuwaitDepartment of Computer Science, Kuwait University, Kuwait City, KuwaitDepartment of Computer Science, Florida Polytechnic University, Lakeland, USAThis paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of initial line of defense services receive new client requests, execute an algorithm to assign them to a proxy server, and reply back with the address of the chosen proxy server. The bootstrapping protocol only reveals one proxy address to each client, maintaining the obscurity of the addresses for other proxy servers. Hiding the addresses of proxy servers aims to lower the likelihood that a proxy server becomes the victim of a denial-of-service (DoS) attack. Existing works address this problem by requiring the solution of computationally intensive puzzles from prospective clients. This solution slows the progression of attacks as well as new clients. This paper presents an alternative idea by observing that limited capacity of handling initial network requests is the primary cause of denial-of-service attacks. Thus, the suggested alternative is to utilize cost-effective high-capacity networks to handle client bootstrapping, thus thwarting attacks on the initial line of defense. The prototype implementation of the protocol using Google’s firebase demonstrates the proof of concept for web services that receive network requests from clients on mobile devices.http://dx.doi.org/10.1155/2020/8873258
collection DOAJ
language English
format Article
sources DOAJ
author Hussain M. J. Almohri
Mohammad Almutawa
Mahmoud Alawadh
Karim Elish
spellingShingle Hussain M. J. Almohri
Mohammad Almutawa
Mahmoud Alawadh
Karim Elish
A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
Security and Communication Networks
author_facet Hussain M. J. Almohri
Mohammad Almutawa
Mahmoud Alawadh
Karim Elish
author_sort Hussain M. J. Almohri
title A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
title_short A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
title_full A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
title_fullStr A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
title_full_unstemmed A Client Bootstrapping Protocol for DoS Attack Mitigation on Entry Point Services in the Cloud
title_sort client bootstrapping protocol for dos attack mitigation on entry point services in the cloud
publisher Hindawi-Wiley
series Security and Communication Networks
issn 1939-0114
1939-0122
publishDate 2020-01-01
description This paper presents a client bootstrapping protocol for proxy-based moving target defense system for the cloud. The protocol establishes the identity of prospective clients who intend to connect to web services behind obscure proxy servers in a cloud-based network. In client bootstrapping, a set of initial line of defense services receive new client requests, execute an algorithm to assign them to a proxy server, and reply back with the address of the chosen proxy server. The bootstrapping protocol only reveals one proxy address to each client, maintaining the obscurity of the addresses for other proxy servers. Hiding the addresses of proxy servers aims to lower the likelihood that a proxy server becomes the victim of a denial-of-service (DoS) attack. Existing works address this problem by requiring the solution of computationally intensive puzzles from prospective clients. This solution slows the progression of attacks as well as new clients. This paper presents an alternative idea by observing that limited capacity of handling initial network requests is the primary cause of denial-of-service attacks. Thus, the suggested alternative is to utilize cost-effective high-capacity networks to handle client bootstrapping, thus thwarting attacks on the initial line of defense. The prototype implementation of the protocol using Google’s firebase demonstrates the proof of concept for web services that receive network requests from clients on mobile devices.
url http://dx.doi.org/10.1155/2020/8873258
work_keys_str_mv AT hussainmjalmohri aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT mohammadalmutawa aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT mahmoudalawadh aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT karimelish aclientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT hussainmjalmohri clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT mohammadalmutawa clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT mahmoudalawadh clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
AT karimelish clientbootstrappingprotocolfordosattackmitigationonentrypointservicesinthecloud
_version_ 1715374035804618752