Implementation of Digital Forensic Technique For Cloud Computing IMPLEMENTATION OF DIGITAL FORENSIC TECHNIQUE FOR CLOUD COMPUTING 1 DEOYANI SHIRKHEDKAR, 2SULABHA PATIL 1 M.Tech. Student (Comp. Sci. and Engg.), T.G.P.C.E.T, Nagpur, M.S. India 2 Assistant Professor M.Tech.(CSE), T.G.P.C.E.T ,Nagpur , M.S. India Abstract- Cloud computing has penetrated the Information Technology industry deep enough to influence major companies to adopt it into their mainstream business. A strong thrust on the use of virtualization technology to realize Infrastructure-asa-Service (IaaS) has led enterprises to leverage subscription-oriented computing capabilities of public Clouds for hosting their application services. A seldomly discussed, but in this regard highly relevant open issue is the ability to perform digital investigations. This continues to fuel insecurity on the sides of both providers and customers. In Cloud Forensics, the lack of physical access to servers constitutes a completely new and disruptive challenge for investigators. Due to the decentralized nature of data processing in the Cloud, traditional approaches to evidence collection and recovery are no longer practical. The main disturbing element of the security of the cloud i.e. the DDoS attacks has led to the establishment of various technologies in order to gain defense against DDoS attacks. This paper gives the implementation of a forensic technique which detects DDoS attack and is used as a service provided by CSP. Keyword: Cloud, DDos Attack, Iaas, Cloud forensic virtual machine (VM)[asurvey on virtualization] A hypervisor is one of many virtualization techniques which allow multiple operating systems, termed guests, to run concurrently on a host computer, a feature called hardware virtualization. It is so named because it is conceptually one level higher than a supervisor. The hypervisor presents to the guest operating systems a virtual operating platform and monitors the execution of the guest OS (guest operating systems) I.INTRODUCTION The Cloud Computing has spread like conflagration in the market within short duration travelling from buzzword to groundbreaker. Now, there are even small companies from animation to distributed computing, though gradually; have started their move to conform changes favored for Cloud field Virtualization is the technology that makes cloud computing possible. When large numbers of computers, storage devices, and networks are gathered together and presented to users as a userprovisioned, incrementally charged, nearly infinite resource, the cloud is born Virtualization has become a standard part of many computer systems. A key part of virtualization is the all-powerful hypervisor which manages the physical platform and can access all of its resources, including memory assigned to the guest virtual machines. There are several common approaches to virtualization with differences between how each controls the virtual machines. They are : Operating system – based virtualization Application – based virtualization Hypervisor – based virtualization Here we will discuss about hypervisor –based virtualization. In two surveys carried out by International data Corporation (IDC) in 2008 and 2009 respectively, security came top on the list. Although traditional threats are countered effectively but still some nonfamiliar risks have been introduced to the cloud. One such threat is Distributed Denial of Service (DDoS) attack. The DDoS attacks which took place in recent years have aroused the need for taking stern steps against it. This paper gives a technique which detects the DDos attack and unauthorized file sharing. A.Hypervisor-Based Virtualization The hypervisor is available at the boot time of machine in order to control the sharing of system resources across multiple VMs. Some of these VMs are privileged partitions which manage the virtualization platform and hosted Virtual Machines. In this architecture, the privileged partitions view and control the Virtual Machines. This approach establishes the most controllable environment and can utilize additional security tools such as intrusion detection systems. II.VIRTUALIZATION Virtualization is the backbone of cloud computing. Virtualization is the abstraction of a hardware or software system that lets applications run on top of the virtualized environment without the need of knowing the underlying resources available. The virtualized environment is otherwise known as the Fig 1: Hypervisorbased Virtualization[30] Proceedings of Fifth IRF International Conference, 10th August 2014, Goa, India, ISBN: 978-93-84209-45-2 95 Implementation of Digital Forensic Technique For Cloud Computing 1)Benefits: 1. Hypervisor provides a narrow interface nearly similar to original hardware interface in traditional system to Guest OS. Actually Hypervisor instructs the hardware in favor of guest OS. This capability allows hypervisor based virtualization to have a secure infrastructure. Hypervisor can act as a firewall and will be able to prevent malicious users to from compromising the hardware infrastructure. 2. Hypervisor is implemented below the guest OS in the cloud computing hierarchy, which means that if an attack passes the security systems in the guest OS, the hypervisor can detect it and it also provides simplified transaction monitoring process. 3. Some services take advantage of services provided by hypervisors. Like a service running below the operating system can fairly easily encapsulate the whole state of a virtual machine. The resulting capsule can then be used to migrate the virtual machine to another physical machine network entry elements; usually any form of hardware that operates on a Blacklist pattern is quickly overrun. Denial-of-Service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic In cloud computing where infrastructure is shared by large number of VM clients, DDoS attacks make have the potential of having much greater impact than against single tenanted architectures If cloud has not sufficient resource to provide services to its VMs then maybe cause undesirable DDoS attacks V.PROPOSED SYSTEM A virtual machine hosted in a cloud environment is used to commit crime as it used to be done with physical computers.. In this section, two scenarios of criminal activities carried out in the cloud are considered, i.e., DDoS attacks and unauthorized file sharing. The environment is set up using two Desktop PC’s, each running Ubuntu 12.04. Here, open source cloud manager, OpenStack is used. One of the hosts running OpenStack host virtual machines. Three virtual machines are deployed in OpenStack where one virtual machine is used to launch attacks and one of the Virtual machines is used to monitor communications between the attacker and the victim virtual machine. The attacker uses the second physical host to access its virtual machine hosted in OpenStack. The monitoring virtual machine uses WireShark and nmap to monitor activities occurring in the victim machine. In this proposed system we have created three virtual machines as follows:1) VM1 - This is the attacker machine with IP address 10.0.1.21.Ubuntu desktop is installed on this machine for GUI. 2) VM2- This is the victim machine with IP address 10.0.1.16.Apache server is installed on this machine. 3) VM3- This is monitor which monitors the system. Monitoring tools wireshark and nmap are installed on this machine III.HYPERVISOR The virtualization marketplace is comprised of both mature (e.g. VMWare and Xen) and up-and-coming (e.g. KVM and Hyper-V) participants. Of the four main Hypervisor offerings, which take up 93% of the total market share two are closed-source (VMWare and Hyper-V) and two are open-source (Xen and KVM). Recent surveys suggest that the number of different Hypervisor brands deployed in datacenters is broad and expanding, with a multi-Hypervisor strategy becoming the norm. A.KVM KVM is a relatively new open-source project, which dates back to Red Hat's acquisition of Qumranet in 2008. Its adoption has spiked since it was made part of the main Linux kernel branch starting from version 2.6.20, becoming the main virtualization package in Ubuntu, Fedora, and other mainstream Linux operating systems. Each guest VM runs as a separate user process and has a corresponding QEMU device emulation instance running with it. The Hypervisor itself runs as a module inside a host Operating System, which makes KVM a Type-II (hosted) Hypervisor. VI.IMPLEMENTATION of PROPOSED SYSTEM Implementation of the proposed technique is a two step process first is to set up an environment and then to perform the tests A.Environmental Set Up Environmental set up is done by using two machines and installing OpenStack cloud manager. The minimum requirements which can support several minimal instances: • Controller Node: 1 processor, 2 GB memory, and 5 GB storage • Network Node: 1 processor, 512 MB memory, and 5 GB storage Fig 2. KVM Architecture[33] IV. DDOS ATTACKS Distributed Denial of Service (DDoS) attacks typically focus high quantity of IP packets at specific Proceedings of Fifth IRF International Conference, 10th August 2014, Goa, India, ISBN: 978-93-84209-45-2 96 Implementation of Digital Forensic Technique For Cloud Computing • Compute Node: 1 processor, 2 GB memory, and 10 GB storage 64-bit ubuntu 12.0 is installed on both the systems List available security groups: ubuntu@root:-$ secgroup-list Security Groups 1)Launch An Instance First open the dashboard through the browser OpenStack Dashboard Launch Instance To launch an instance, you must at least specify the flavor, image name, network, security group, key, and instance name. A flavor specifies a virtual resource allocation profile which includes processor, memory, and storage. List available flavors: ubuntu@root :-$ flavor-list Flavours VII.EXPERIMENTS AND RESULTS Two types of attacks has been executed on Cloud Controller which has been found to be simple but highly penetrable: DDoS Attack In this part, the “SSL DoS” tool has initiated large SSL handshakes mechanism with the server so that it will easy to bring down and eventually crash down the cloud system. The fundamental idea is to commit large numbers of handshakes with a server after establishing secure socket layer (SSL) connection. SSL is the protocol which is in the middle of Application and Network layer which ensures security and confidentiality. The attack has been performed as follows: The most popular & admin/hacker friendly utility hping3, basically used to test firewall rules and nmap protocol scanning purposes is used. The command given from the attacker VM is as follows: . List available images: ubuntu@root :-$ image-list ubuntu@demo1-attacker:-$ hping3 -1 172.24.4.123 List available networks: ubuntu@root :-$ net-list Fig 3 Flooding from attacker virtual machine Proceedings of Fifth IRF International Conference, 10th August 2014, Goa, India, ISBN: 978-93-84209-45-2 97 Implementation of Digital Forensic Technique For Cloud Computing change which shows that the contents of the file were change by attacker. CONCLUSION AND FUTURE SCOPE This research work presented, a technique aimed at addressing digital forensics challenges in a cloud environment. The technique addresses the issue of data acquisition in the cloud. . Finally, we conclude from the results that, the technique detects the unauthorized file sharing and the DDos attack successfully .It is used as a service at CSP end. It is a SaaS application. Fig: 4 Legitimate Traffic( before any attack ) CPU Statistics The next step in this research involves Development of an algorithm that will extract log information from accessible locations in the crime scene. The domain knowledge representation that is used in reasoning while associating an attacker with data in the cloud is also going to be developed. The development of a guideline that will be used to validate evidence collected using this service. Before invoking TCP SYN flood, CPU statistics of front end, the system was receiving data at a rate of 1.6 KB/s as shown in image 4. REFERENCES [1] Dominik Birk, Christoph Wegener” Technical Issues of Forensic Investigations in Cloud Computing Environments” [2] George Sibiya,Hein S. Venterand Thomas Fogwill,”Digital Forensic Framework for a cloud Environment”,IST-Africa 2012 conference proceedings [3] Wireshark: The world’s foremost network protocol analyser, [Online] Available at: http://www.wireshark.org/ [Accessed 30 November 2014]. [4] http://nmap.org/, [Accessed 10 December 2014]. [5] S. Castro, Virtual machine trojan: A new type of threat. [Online] Available at: http://www. infosegura.net /VMTthreat.html [Accessed 15 November 2014]. [6] E. W. Hobson, Qinetiq white paper: Digital investigations in the cloud, QinetiQ Digital Investigations Service, Farnborough, UK, 2010. [7] R, Ieong, Challenges to digital forensics from cloud computing, [Online] Available at: http://www.chinaforensic.com/downloads/2011 [Accessed 15 November 2014]. [8] R. Marty, Cloud application logging for forensics. Taichung, Taiwan, March 2011. SAC, ACM. [9] M.A. Monroe, Virtualization and Cloud Computing Draft Version. Digital Reality Trust, drivers of data growth, part 2 edition, 2010. Fig 5 Resultant Traffic After Attack In this case, distributed attack strategy has observed. When this hping3 flood command based attack has instantiated, there has observed a sudden hike in the data receiving from the random IP address. The machine even stops responding even from opening the command line. Unauthorized file sharing attack Here we have used Samba Server. First we have installed samba server on the demo1-http1 machine. Then we have created a shared folder with right as nobody. The files were created from demo1-http1. These files are accessed from demo1-attacker. Following commands were used:ubuntu@demo1-http1:-$ Sudo apt-get install Samba ubuntu@demo1-http1:-$sudo nautilus ubuntu@demo1-http1:-$sudo-config-samba we have made following change in the config file ubuntu@demo1-http1:-$ /etc/samba/samba.conf [10] I. Resendez, P. Martinez, and J. Abraham, An introduction to digital forensics. [Online] Available at: http://acetweb. org/journal/ACETJournal_Vol6/ [Accessed 01 November 2014]. The change made was log level=3 The demo1-attacker vm accessed the file stored and created by demo1-http1 vm.We have used the CRC checker and found that the CRC of the file was [11] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, Cloud forensics: An overview. [Online] Available at: Proceedings of Fifth IRF International Conference, 10th August 2014, Goa, India, ISBN: 978-93-84209-45-2 98 Implementation of Digital Forensic Technique For Cloud Computing http://cloudforensicsresearch.org/publication/ [Accessed 10 November 2014]. [24] Rainer Poisel, Erich Malzer and Simon Tjoa,” Evidence and Cloud Computing: The Virtual Machine Introspection Approach” [25] Johnson D,Kiran Murari,Murthy Raju,Suseendran RB,Yogesh Girikumar, Eucalyptus Beginner's Guide – UEC Edition (Ubuntu Server 10.04 - Lucid Lynx)v1.0, 25 May 2010 [12] C. A. Schiller, J. Binkley, D. Harley, G. Evron, T. Bradley, C. Willems, and M. Cross. Botnets: The killer web application. Syngress, Inc Publishing, 2007. [13] J. Shende. Digital forensic challenges within cloud computing. [Online] Available at:http://jonshende. blogspot.com /2010/10/ digital-forensicchallengeswithin.html [ 30 October 2011]. [26] Mayur S. Patil, Prof. Bharati Ainapure, “Intrusion Detection by Forensic Method in Private Cloud using Eucalyptus” , International Journal of Computer Applications (0975 – 8887), Volume 85 – No 12, January 2014 [14] T. Stallard and K. Levitt, Automated analysis for digital forensic science: Semantic integrity checking, University of California, One Shield Avenue, Davis, CA, 95616 USA, 2003. [27] Mohamed-K Hussein, Mohamed-H Mousa , “Highperformance Execution of Scientific Multi-Physics Coupled Applications in a Private Cloud “, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 4, Issue 2, February 2014 ISSN: 2277 128X [15] I.Walden, Law enforcement access in a cloud environment, Queen Mary University of Londin, Schoolof Law , 2011. [16] S. Zimmerman and D. Glavach. Cyber forensics in the cloud, IANewsletter, Volume 14 Number 1,Winter 2011, p 4. [28] G. Srinivas Reddy,”Functional Analysis of the Eucalyptus Private Cloud “, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 9, March 2013, ISSN: 2277-3754 ISO 9001:2008 Certified [17] N.Jaswanth, J.Durga, “An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment”, International Journal of Computer Trends and Technology (IJCTT) - volume4 Issue5–May 2013 [29] Upma Goyal, Gayatri Bhatti and Sandeep Mehmi, “A Dual Mechanism for defeating DDoS Attacks in Cloud Computing Model” ,International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: editor@ijaiem.org,ditorijaiem@gmail.com,Volume 2, Issue 3, March 2013 ISSN 2319 – 4847 [18] Nandan Mirajkar, Mohan Barde, Harshal Kamble, Dr.Rahul Athale, Kumud Singh, “Implementation of Private Cloud using Eucalyptus and an open source Operating System” [19] Ludwig Slusky, Parviz Partow-Navid, Mohit Doshi, “Cloud computing and computer forensics for business applications”, Journal of Technology Research [30] Farzad Sabahi, “Secure Virtualization for Cloud Environment Using Hypervisor-based Technology”, International Journal of Machine Learning and Computing, Vol. 2, No. 1, February 2012 [20] Simon Ostermann1, Alexandru Iosup2, Nezih Yigitbasi2, An Early Performance Analysis of Cloud Computing Services for Scientific Computing Delft University of Technology Parallel and Distributed Systems Report Series, ISSN 13872109 [31] Debojyoti Sengupta,” A Survey on Security of Hypervisorbased Virtualization System in Cloud Computing” [32] Jakub Szefer, Ruby B. Lee,” Architectural Support for Hypervisor-Secure Virtualization”, International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), March 2012. [21] Jaliya Ekanayake ,Xiaohong Qiu1, Thilina Gunarathne, Scott Beason, Geoffrey Fox, “High Performance Parallel Computing with Cloud and Cloud Technologies” [22] Siani Pearson, Yun Shen and Miranda Mowbray, A Privacy Manager for Cloud Computing [33] Diego Perez-Botero, Jakub Szefer and Ruby B. Lee,” Characterizing Hypervisor Vulnerabilities in Cloud Computing Servers”, Workshop on Security in Cloud Computing (SCC), May 2013 [23] Liang Yan, Chunming Rong, and Gansen Zhao, “Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography”, M.G. Jaatun, G. Zhao, and C. Rong (Eds.): CloudCom 2009, LNCS 5931, pp. 167–177, 2009. © Springer-Verlag Berlin Heidelberg 2009 [34] Naresh Kumar, Shalini Sharma,” Study of Intrusion Detection System for DDoS Attacks in Cloud Computing”, 978-1-4673-5999-3/13/$31.00 ©2013 IEEE [35] A.M. Lonea, D.E. Popescu, H. Tianfield,” Detecting DDoS Attacks in Cloud Computing Environment”, INT J COMPUT COMMUN, ISSN 1841-9836 ,8(1):70-78, February, 2013. Proceedings of Fifth IRF International Conference, 10th August 2014, Goa, India, ISBN: 978-93-84209-45-2 99