436
INTELLIGENT CITIES
12.3.4 Distributed Denial of Service
In a cloud system, if a host of messages attack all nodes of the cloud
system and overutilize the server resources, making the resources
unavailable for actual requirements, it is called a distributed denial
of service (DDoS) attack. ere are two primary versions of DDoS
attacks that can occur: simple and complex. Examples of simple
DDoS attack tools are X-Dos (XML-based denial of service) as well
as H-Dos (HTTP-based denial of service). Example of complex
DDoS attack tools are Agobot, Mstream, and Trinoo. H-DoS are
used by attackers who are interested in using less complex Web-based
tools for attack. One additional advantage of these simple tools is the
ease of implementation of attacks. DX-DoS occurs when XML-based
messages are sent to a Web server in such a way that they will use up
all the server’s resources. Coercive parsing attack is an X-Dos attack
in which Web content is parsed using Simple Object Access Protocol
(SOAP) to transform it into an application. A series of open tags are
used by a coercive parsing attack to exhaust the central processing
unit (CPU) resources on the Web server. In case of an H-DoS attack,
a series of about 1000 plus threads are started to create HTTP simul-
taneous random requests to exhaust all the resources. Several tools
are available in the market to detect and eliminate DDoS attacks.
Cloud service providers can use these tools at their discretion. One
such example is discussed in the following paragraph.
12.3.4.1 Real-Life Example of DDoS Attack Bloomberg News reported
that hackers used AWS’s EC2 cloud computing unit to launch an
attack against Sony’s PlayStation Network and Qriocity entertain-
ment networks. e attack reportedly compromised the personal
accounts of more than 100 million Sony customers.
12.3.4.2 Imperva SecureSphere Web Application Firewall to Prevent DDoS
Attacks e Imperva SecureSphere Web Application Firewall is a
security appliance that is capable of preventing DDoS attacks in a
cloud infrastructure. In addition to DDoS, this software also has the
capability to prevent several types of Web attacks such as Structured
Query Language (SQL) injection.