Title :
Robust Coordination of Cloud-Internal Denial of Service Attacks
Author :
Alarifi, Suaad ; Wolthusen, Stephen D.
Author_Institution :
Inf. Security Group R. Holloway, Univ. of London, Egham, UK
fDate :
Sept. 30 2013-Oct. 2 2013
Abstract :
In an Infrastructure as a Service (IaaS) cloud environment, workloads change dynamically with limited insight by service providers into the precise characteristics of client workloads. At the same time, service providers must seek to honour service level agreements (SLA) regarding performance and availability. In this paper we describe and analyse a class of attacks that may target other workloads or the ability of a service provider to satisfy SLA requirements by launching tightly coordinated attack or attack sequence. The attack seeks to utilise resource over-commitment and the cost of migration and related secondary effects such as power management rather than relying on implementation-specific weaknesses that could be mitigated more easily. The effectiveness of the attack depends on the ability to co-locate and precisely modulate workloads of virtual machines (VMs) on a single host. We describe a novel coordination protocol relying on broadcast primitives in memory-based covert channels for dynamic attack group membership and attack initiation based on a broadcast variant of the Jarecki-Kim-Tsudik (JKT) protocol. This protocol requires very limited channel capacity and has O(n + T) message complexity whilst tolerating up to T failures, increasing the difficulty of detection and mitigation.
Keywords :
cloud computing; computational complexity; computer network security; power aware computing; protocols; software fault tolerance; virtual machines; IaaS cloud environment; JKT protocol; Jarecki-Kim-Tsudik protocol; VMs; attack initiation; broadcast variant; cloud-internal denial of service attacks; coordination protocol; dynamic attack group membership; failure tolerance; infrastructure as a service cloud environment; memory-based covert channels; message complexity; power management; service level agreements; virtual machines; Complexity theory; Computer crime; Educational institutions; IP networks; Protocols; Robustness; Virtual machining; Broadcast Group Key Agreement; Covert Channels; Denial of Service; IaaS Cloud Security;
Conference_Titel :
Cloud and Green Computing (CGC), 2013 Third International Conference on
Conference_Location :
Karlsruhe
DOI :
10.1109/CGC.2013.28