Home > Published Issues > 2023 > Volume 14, No. 2, 2023 >
JAIT 2023 Vol.14(2): 193-203
doi: 10.12720/jait.14.2.193-203

Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM

Ryuga Kaneko * and Taiichi Saito
Department of Information and Communication Engineering, Tokyo Denki University, Tokyo, Japan;
Email: taiichi@c.dendai.ac.jp (T.S.)
*Correspondence: 19nc016@ms.dendai.ac.jp (R.K.)

Manuscript received July 6, 2022; revised August 2, 2022; accepted August 22, 2022; published March 14, 2023.

Abstract—This paper proposes a new method to detect Cookie Bomb attacks. A Cookie Bomb attack is a denial-of-service attack such that a user cannot receive a legitimate Hypertext Transfer Protocol (HTTP) response from an HTTP server because the total amount of cookies in an HTTP request exceeds the size limit accepted by the HTTP server. The new method includes our cloud architecture and detection algorithms. The cloud architecture distributes and executes a detection script, which is an implementation of the detection algorithms. This architecture uses Azure Virtual Machines, Azure Storage, Azure Automation, Azure Monitor, and Microsoft Sentinel. The virtual machines are the core components of the architecture, to which end users can connect via RDP to use their browsers. The detection script performs three tasks: obtaining paths to cookies databases generated by browsers, retrieving cookies data from a database, and comparing a threshold with the total size of all cookies a browser sends to a server. Results indicate that our proposed method 1) enables scheduled automation, 2) provides better visibility across regions, and 3)expands detection coverage for different Windows users,browsers, and browser profiles.
 
Keywords—cybersecurity, cookie bomb attack, cloud computing, security information and event management

Cite: Ryuga Kaneko and Taiichi Saito, "Detection of Cookie Bomb Attacks in Cloud Computing Environment Monitored by SIEM," Journal of Advances in Information Technology, Vol. 14, No. 2, pp. 193-203, 2023.

Copyright © 2023 by the authors. This is an open access article distributed under the Creative Commons Attribution License (CC BY-NC-ND 4.0), which permits use, distribution and reproduction in any medium, provided that the article is properly cited, the use is non-commercial and no modifications or adaptations are made.