SLIDE 10 unrestricted
Vulnerability Measurement (small cluster)
Minimum quantity of resources to be under the control of the attacker? Cluster vulnerability is high when this quantity is low
0, 0,5 1 1, 1,5 2 2, 2,5 3
2 3 4 5
Vulnera rabil ility ity increas ases s when cluster r size e increas ases Vulnera rabil ility ity increas ases s when DRS Aggr gressi sivenes ess s increas ases
5 10 10 15 15
2 3 4 5 Cluster Size (N) Minimum Required Resource
2 4 6 8 10 10 12 12
2 3 4 5 Moderate (Default) Minimum Required Resource Cluster Size (N) Minimum Required Resource Cluster Size (N)
11,5 11 11 10,5 10 10 2,5
Agressive
5
1 2 3 4 5 6
2 3 4 5 Minimum Required Resource Cluster Size (N) Moderately Aggressive Moderately Conservative
14 14
CPU (vCPU)
Memory (GB)
Context:‘one shot’ Abusive VM Migration attack, execution context described in slide 8
8