Adaptive Stealth Energy-Related DoS Attacks against Cloud Data Centers

The effects of energy-related Denial of Service (DoS) attacks on modern large-scale cloud data centers may involve not only the availability or quality of the service delivered through these infrastructures, but also their operational costs in terms of energy bill. Specifically, the longer is the time needed to detect the attack, the higher is the impact on the overall energy consumption and hence on the related expenses. Therefore, particular attention has to be paid for low-rate DoS attacks. They aim at minimizing their visibility, and at the same time, can be as harmful as the more traditional DoSs or even worse. These sophisticated attacks are tailored to induce the worst-case energy demands on the target system by leveraging properly crafted low-rate traffic patterns. In this work, we introduce a strategy for orchestrating adaptive variable-rate attacks that dynamically change their offending patterns and packet rate in order to minimize their detectability and maximize their energy-related impact, by wasting as much energy as possible. We describe both the details behind the proposed strategy, and analyze its potential effects on typical servers operating within large-scale cloud data center infrastructures.

[1]  Christian Esposito,et al.  Interconnecting Federated Clouds by Using Publish-Subscribe Service , 2013, Cluster Computing.

[2]  Paul Watson,et al.  Experiments Towards Adaptation of Concurrent Workflows , 2007, ECOWS 2007.

[3]  Dan S. Wallach,et al.  Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.

[4]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[5]  L. Schwartz,et al.  Sophisticated Denial of Service attacks aimed at application layer , 2012, 2012 ELEKTRO.

[6]  Maciá-FernándezGabriel,et al.  Mathematical model for low-rate DoS attacks against application servers , 2009 .

[7]  Beniamino Di Martino,et al.  An intrusion detection framework for supporting SLA assessment in Cloud Computing , 2012, 2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN).

[8]  Francesco Palmieri,et al.  Analyzing Local Strategies for Energy-Efficient Networking , 2011, Networking Workshops.

[9]  Xiao Guo,et al.  A queuing analysis for low-rate DoS attacks against application servers , 2010, 2010 IEEE International Conference on Wireless Communications, Networking and Information Security.

[10]  Zhenyu Wu,et al.  Energy Attack on Server Systems , 2011, WOOT.

[11]  John McHugh,et al.  Structured Peer-to-Peer Overlay Networks: Ideal Botnets Command and Control Infrastructures? , 2008, ESORICS.

[12]  Michael S. Hsiao,et al.  Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[13]  Xiapu Luo,et al.  On a New Class of Pulsing Denial-of-Service Attacks and the Defense , 2005, NDSS.

[14]  Francesco Palmieri,et al.  Evaluating Network-Based DoS Attacks under the Energy Consumption Perspective: New Security Issues in the Coming Green ICT Area , 2011, 2011 International Conference on Broadband and Wireless Computing, Communication and Applications.

[15]  Massimiliano Rak,et al.  Intrusion Tolerant Approach for Denial of Service Attacks to Web Services , 2011, 2011 First International Conference on Data Compression, Communications and Processing.

[16]  Francesco Palmieri,et al.  Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..

[17]  CastiglioneAniello,et al.  A distributed approach to network anomaly detection based on independent component analysis , 2014 .

[18]  Zhenyu Wu,et al.  On Energy Security of Server Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[19]  Gabriel Maciá-Fernández,et al.  Mathematical Model for Low-Rate DoS Attacks Against Application Servers , 2009, IEEE Transactions on Information Forensics and Security.

[20]  Aleksandar Kuzmanovic,et al.  Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.

[21]  Rocco Aversa,et al.  Intrusion Detection in Cloud Computing , 2013, 2013 Eighth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[22]  Nils Gruschka,et al.  A survey of attacks on web services , 2009, Computer Science - Research and Development.

[23]  Francesco Palmieri,et al.  A distributed approach to network anomaly detection based on independent component analysis , 2014, Concurr. Comput. Pract. Exp..

[24]  Angelos D. Keromytis,et al.  Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction , 2009 .

[25]  Massimiliano Rak,et al.  Intrusion Tolerance of Stealth DoS Attacks to Web Services , 2012, SEC.

[26]  Wanlei Zhou,et al.  Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks , 2011, J. Netw. Comput. Appl..

[27]  Gabriel Maciá-Fernández,et al.  LoRDAS: A Low-Rate DoS Attack against Application Servers , 2007, CRITIS.

[28]  Senthil Mani,et al.  Preventing Service Oriented Denial of Service (PreSODoS): A Proposed Approach , 2006, 2006 IEEE International Conference on Web Services (ICWS'06).

[29]  Salvatore Venticinque,et al.  mOSAIC-Based Intrusion Detection Framework for Cloud Computing , 2012, OTM Conferences.

[30]  Anat Bremler-Barr,et al.  Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[31]  Alessio Merlo,et al.  Green-Aware Security : Towards a new Research Field , 2012 .

[32]  Hossein Rouhani Zeidanloo,et al.  Botnet Command and Control Mechanisms , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[33]  Nils Gruschka,et al.  SOA and Web Services: New Technologies, New Standards - New Attacks , 2007, Fifth European Conference on Web Services (ECOWS'07).

[34]  Sven Dietrich,et al.  P2P as botnet command and control: A deeper insight , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).

[35]  Francesco Palmieri,et al.  A botnet-based command and control approach relying on swarm intelligence , 2014, J. Netw. Comput. Appl..