TY - GEN
T1 - Host-based DoS attacks and defense in the cloud
AU - Zhang, Tianwei
AU - Lee, Ruby B.
PY - 2017/6/25
Y1 - 2017/6/25
N2 - We explore host-based DoS attacks, which exploit the shared computing resources in a multi-Tenant cloud server to com-promise the server's resource availability. We first present a set of attack techniques targeting different types of re-sources. We show such attacks can significantly affect the performance of co-located VMs, as well as the cloud provider's management services. Then we propose an attack strategy to compromise the availability of the entire datacenter. We show how power-Aware optimization techniques can help the attacker achieve his goal faster, with low cost. We design an effective general-purpose method to defeat memory, network and disk DoS attacks. We use a statis-tical method to detect changes in the usage of different re-sources. Once an attack happens, we use resource throttling techniques to identify and thwart the malicious VMs. Our evaluation shows that this defense method can effectively defeat these DoS attacks with negligible performance over-head. We alert the computer architecture community to these catastrophic attacks on the availability of cloud com-puting resources, to encourage building in better defenses at both the hardware and software levels.
AB - We explore host-based DoS attacks, which exploit the shared computing resources in a multi-Tenant cloud server to com-promise the server's resource availability. We first present a set of attack techniques targeting different types of re-sources. We show such attacks can significantly affect the performance of co-located VMs, as well as the cloud provider's management services. Then we propose an attack strategy to compromise the availability of the entire datacenter. We show how power-Aware optimization techniques can help the attacker achieve his goal faster, with low cost. We design an effective general-purpose method to defeat memory, network and disk DoS attacks. We use a statis-tical method to detect changes in the usage of different re-sources. Once an attack happens, we use resource throttling techniques to identify and thwart the malicious VMs. Our evaluation shows that this defense method can effectively defeat these DoS attacks with negligible performance over-head. We alert the computer architecture community to these catastrophic attacks on the availability of cloud com-puting resources, to encourage building in better defenses at both the hardware and software levels.
UR - http://www.scopus.com/inward/record.url?scp=85025443950&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85025443950&partnerID=8YFLogxK
U2 - 10.1145/3092627.3092630
DO - 10.1145/3092627.3092630
M3 - Conference contribution
AN - SCOPUS:85025443950
T3 - ACM International Conference Proceeding Series
BT - Hardware and Architectural Support for Security and Privacy, HASP 2017
PB - Association for Computing Machinery
T2 - 6th International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2017
Y2 - 25 June 2017
ER -