• DocumentCode
    655079
  • Title

    Robust Coordination of Cloud-Internal Denial of Service Attacks

  • Author

    Alarifi, Suaad ; Wolthusen, Stephen D.

  • Author_Institution
    Inf. Security Group R. Holloway, Univ. of London, Egham, UK
  • fYear
    2013
  • fDate
    Sept. 30 2013-Oct. 2 2013
  • Firstpage
    135
  • Lastpage
    142
  • Abstract
    In an Infrastructure as a Service (IaaS) cloud environment, workloads change dynamically with limited insight by service providers into the precise characteristics of client workloads. At the same time, service providers must seek to honour service level agreements (SLA) regarding performance and availability. In this paper we describe and analyse a class of attacks that may target other workloads or the ability of a service provider to satisfy SLA requirements by launching tightly coordinated attack or attack sequence. The attack seeks to utilise resource over-commitment and the cost of migration and related secondary effects such as power management rather than relying on implementation-specific weaknesses that could be mitigated more easily. The effectiveness of the attack depends on the ability to co-locate and precisely modulate workloads of virtual machines (VMs) on a single host. We describe a novel coordination protocol relying on broadcast primitives in memory-based covert channels for dynamic attack group membership and attack initiation based on a broadcast variant of the Jarecki-Kim-Tsudik (JKT) protocol. This protocol requires very limited channel capacity and has O(n + T) message complexity whilst tolerating up to T failures, increasing the difficulty of detection and mitigation.
  • Keywords
    cloud computing; computational complexity; computer network security; power aware computing; protocols; software fault tolerance; virtual machines; IaaS cloud environment; JKT protocol; Jarecki-Kim-Tsudik protocol; VMs; attack initiation; broadcast variant; cloud-internal denial of service attacks; coordination protocol; dynamic attack group membership; failure tolerance; infrastructure as a service cloud environment; memory-based covert channels; message complexity; power management; service level agreements; virtual machines; Complexity theory; Computer crime; Educational institutions; IP networks; Protocols; Robustness; Virtual machining; Broadcast Group Key Agreement; Covert Channels; Denial of Service; IaaS Cloud Security;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Cloud and Green Computing (CGC), 2013 Third International Conference on
  • Conference_Location
    Karlsruhe
  • Type

    conf

  • DOI
    10.1109/CGC.2013.28
  • Filename
    6686020