Evaluating the impact of eDoS attacks to cloud facilities
Gian-Luca Dei Rossi 1 Mauro Iacono 2 Andrea Marin 1
1Universit`
a Ca’ Foscari Venezia 2Seconda Universit` a di Napoli
Evaluating the impact of eDoS attacks to cloud facilities Gian-Luca - - PowerPoint PPT Presentation
Evaluating the impact of eDoS attacks to cloud facilities Gian-Luca Dei Rossi 1 Mauro Iacono 2 Andrea Marin 1 1 Universit` a Ca Foscari Venezia 2 Seconda Universit` a di Napoli November 18, 2015 The setting Nowadays the use of cloud computing
1Universit`
a Ca’ Foscari Venezia 2Seconda Universit` a di Napoli
◮ Infrastructure as a service ◮ Platform as a service ◮ Software as a service ◮ . . .
◮ Performance constraints (SLAs,. . . ) ◮ Economic constraints (budgets, pricing policies,. . . )
◮ Hardware powered on and off on demand ◮ Policies have to take into account performance constraints
◮ Strategies can be complex and at different granularities Evaluating the impact of eDoS attacks to cloud facilities 2 of 30
◮ aiming at degrading performance indices, e.g., average response time, and
◮ easy to notice, but not so easy to counteract ◮ the attacker has a simple and noticeable goal
◮ aims at the maximisation of energy consumption ◮ using legitimate workload ◮ non-disruptive and long-term
◮ it should not crash the system ◮ it has to be hard to notice
◮ the attacker has not a feedback on the success of the attack
◮ no knowledge about energy management policies of providers ◮ lack of a simple correlation between load and energy consumption
Evaluating the impact of eDoS attacks to cloud facilities 3 of 30
1 2 · · · T T + 1 · · · K − 1 K λ(0) λ(1) λ(2) λ(T) λ(T + 1) λ(K − 1) µ(1) µ(2) µ(T) µ(T + 1) µ(K − 1) OK, 1 OK, 1 OK, 1 OK, 1 LT +1, 1 LK−1, 1 LK, 1 λ, 1 λ, 1 λ, 1 λ, 1 λ, 1 λ, 1
◮ states 0 to T: system dynamically scales its computational power ◮ states T + 1 to K − 1: system cannot scale, performance degradation ◮ state K: the system has crashed or the attack was discovered
Evaluating the impact of eDoS attacks to cloud facilities 4 of 30
1 2 · · · G − 2 G − 1 λ, λA(0) λ, λA(1) λ, λA(2) λ, λA(G − 2) λ, λA(G − 1) OK, γ(0) OK, γ(1) OK, γ(2) OK, γ(G − 2) Lk, γ(1) Lk, γ(2) Lk, γ(G − 2) Lk, γ(G − 1)
Evaluating the impact of eDoS attacks to cloud facilities 5 of 30
K−1
◮ states of X(t) are pairs (k, g) with 0 ≤ k ≤ K and 0 ≤ g ≤ G − 1 ◮ we write |X(t)|1 (|X(t)|2) to denote the first (second) component of the pair.
Evaluating the impact of eDoS attacks to cloud facilities 6 of 30
◮ Once the cloud is in state K (failure or attack detection) it cannot leave ◮ In the joint model all states (K, g) with g = 0, . . . G − 1 form an absorbing
Evaluating the impact of eDoS attacks to cloud facilities 7 of 30
j=s
Evaluating the impact of eDoS attacks to cloud facilities 8 of 30
◮ We propose an approximation based on quasi stationarity theory ◮ If τ ≫ trans. times of X(t), transient part may have a stationary behaviour.
Evaluating the impact of eDoS attacks to cloud facilities 9 of 30
◮ limt→∞ Prw{τ > t + ∆t|τ > t} = e−α∆t ; ◮ limt→∞ Prw{X(t) = s|τ > t} = q(s) .
Evaluating the impact of eDoS attacks to cloud facilities 10 of 30
s∈U
Evaluating the impact of eDoS attacks to cloud facilities 11 of 30
◮ evaluate the energy consumption of a cloud infrastructure given a (legitimate
◮ evaluate the behaviour and the effectiveness of an eDoS attacker using a
◮ evaluate the quality of the quasi-stationarity based approximation
custom-made
G
Evaluating the impact of eDoS attacks to cloud facilities 12 of 30
◮ The attacker moves from state g to state g + 1, i.e., it increases
◮ The attacker moves from state g to state g − 1 whenever it
◮ The attacker moves from state g to state g + 1 whenever it
◮ The attacker goes back to state 0 whenever it observes a QoS
◮ The attacker moves from state g to state g + 1 whenever it
◮ When a QoS of type Lk is observed, the attacker moves from
Evaluating the impact of eDoS attacks to cloud facilities 13 of 30
Evaluating the impact of eDoS attacks to cloud facilities 14 of 30
6
Evaluating the impact of eDoS attacks to cloud facilities 15 of 30
Evaluating the impact of eDoS attacks to cloud facilities 16 of 30
Evaluating the impact of eDoS attacks to cloud facilities 17 of 30
Evaluating the impact of eDoS attacks to cloud facilities 18 of 30
Evaluating the impact of eDoS attacks to cloud facilities 19 of 30
Evaluating the impact of eDoS attacks to cloud facilities 20 of 30
Evaluating the impact of eDoS attacks to cloud facilities 21 of 30
Evaluating the impact of eDoS attacks to cloud facilities 22 of 30
Evaluating the impact of eDoS attacks to cloud facilities 23 of 30
Evaluating the impact of eDoS attacks to cloud facilities 24 of 30
Evaluating the impact of eDoS attacks to cloud facilities 25 of 30
Evaluating the impact of eDoS attacks to cloud facilities 26 of 30
−10
−8
−6
−4
−2
Evaluating the impact of eDoS attacks to cloud facilities 27 of 30
−10
Evaluating the impact of eDoS attacks to cloud facilities 28 of 30
◮ We proposed a Markovian model to study the impact of eDoS attacks to cloud
◮ We analysed the mean time to absorption and on the expected cumulated
◮ We gave numerically stable methods to compute (or approximate for
◮ We found that low-aggressive strategies of the attackers are more dangerous
◮ give a more detailed model of the cloud infrastructure ◮ give a model for non-coordinated attackers performing a distributed eDoS ◮ perform a validation of the analysis on real data ◮ design a statistic approach to estimate the probability of being in presence of
◮ . . .
Evaluating the impact of eDoS attacks to cloud facilities 29 of 30
Evaluating the impact of eDoS attacks to cloud facilities 30 of 30