DOI QR코드

DOI QR Code

Implementing Firewall to Mitigate YOYO Attack on Multi Master Cluster Nodes Using Fail2Ban

  • Muhammad Faraz Hyder (Department of Software Engineering Technology, NED University Of Engineering Technology) ;
  • Muhammad Umer Farooq (Department of Computer Science and Information Technology, NED University Of Engineering Technology) ;
  • Mustafa Latif (Department of Software Engineering Technology, NED University Of Engineering Technology) ;
  • Faizan Razi Khan (Department of Computer Science and Information Technology, NED University Of Engineering Technology) ;
  • Abdul Hameed (Department of Computer Science and Information Technology, NED University Of Engineering Technology) ;
  • Noor Qayyum Khan (Department of Computer Science and Information Technology, NED University Of Engineering Technology) ;
  • M. Ahsan Siddiqui (Department of Computer Science and Information Technology, NED University Of Engineering Technology)
  • Received : 2023.02.05
  • Published : 2023.02.28

Abstract

Web technology is evolving with the passage of time, from a single node server to high availability and then in the form of Kubernetes. In recent years, the research community have been trying to provide high availability in the form of multi master cluster with a solid election algorithm. This is helpful in increasing the resources in the form of pods inside the worker node. There are new impact of known DDoS attack, which is utilizing the resources at its peak, known as Yoyo attack. It is kind of burst attack that can utilize CPU and memory to its limit and provide legit visitors with a bad experience. In this research, we tried to mitigate the Yoyo attack by introducing a firewall at load-balancer level to prevent the attack from going to the cluster network.

Keywords

References

  1. Sysdig,The fifth annual Sysdig Cloud-Native Security and Usage Re- port.2022
  2. Ben David et al. Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation,2021
  3. Kubernetes, The 4C's of Cloud Native security.[online].Available:https://kubernetes.io/docs/concepts/security/overview/the-4c-s-of-cloud-native-security
  4. Xiaoqiong Xu et al,Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism.2019, [online]Avaiable:https://www.sciencedirect.com/science/article/pii/S2352864819301440
  5. Liu et al, A clusterized firewall framework for cloud computing. In Pro- ceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, Australia, 10-14 June 2014; pp. 3788-3793.
  6. Monge et al, Entropy-Based Economic Denial of Sustain- ability Detection. Entropy 2017, 19, 649.[online] Available: https://doi.org/10.3390/e19120649
  7. Viktor Danielsen, Detecting Yo-Yo DoS attack in acontainerbased environment,2021,[online] Available:https://hdl.handle.net/11250/2774518
  8. Zeebaree, Subhi Rafeeq, Karwan Jacksi, and Rizgar R. Zebari. "Impact analysis of SYN flood DDoS attack on HAProxy and NLB cluster-based web servers." Indones. J. Electr. Eng. Comput. Sci 19.1 (2020): 510-517. https://doi.org/10.11591/ijeecs.v19.i1.pp505-512
  9. Carrion, Carmen. "Kubernetes scheduling: Taxonomy, ongoing issues and challenges." ACM Computing Surveys (CSUR) (2022).
  10. Mondal, Subrota Kumar, et al. "Kubernetes in IT administration and serverless computing: An empirical study and research challenges." The Journal of Supercomputing 78.2 (2022): 2937-2987. https://doi.org/10.1007/s11227-021-03982-3
  11. Netto, Hylson, et al. "Incorporating the Raft consensus protocol in containers managed by Kubernetes: An evaluation." International Journal of Parallel, Emergent and Distributed Systems 35.4 (2020): 433-453. https://doi.org/10.1080/17445760.2019.1608989
  12. Xiong, Huanliang, et al. "Research on Progress of Blockchain Consensus Algorithm: A Review on Recent Progress of Blockchain Consensus Algorithms." Future Internet 14.2 (2022): 47.
  13. Minna, Francesco, et al. "Understanding the security implications of kubernetes networking." IEEE Security & Privacy 19.05 (2021): 46-56. https://doi.org/10.1109/MSEC.2021.3094726
  14. Shamim, Shazibul Islam. "Mitigating security attacks in kubernetes manifests for security best practices violation." Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2021.
  15. Ylli, Enkli, Igli Tafa, and Flavia Marku. "Examining the Server's Load Average When Trying to Attack the Firewall." Proceedings of Sixth International Congress on Information and Communication Technology. Springer, Singapore, 2022.
  16. Mostamand Kashi, Meraj. Implementation of an approach to mitigate Yo-Yo attack in cloud auto-scaling mechanism. MS thesis. OsloMet-storbyuniversitetet, 2022.