Outline Problem Definition Dynamic Resource Management - - PowerPoint PPT Presentation

outline
SMART_READER_LITE
LIVE PREVIEW

Outline Problem Definition Dynamic Resource Management - - PowerPoint PPT Presentation

When dynamic VM migration falls under the control of VM user Kahi hina na LAZ AZRI, Sylvie LANIEPCE, Haiming ZHENG IMT/OLPS/ASE/SEC/NPS Orange Labs, Caen Jalel Ben-Othman L2TI laboratory Paris13 Symposium sur la scurit des


slide-1
SLIDE 1

unrestricted

When dynamic VM migration falls

under the control of VM user…

Kahi hina na LAZ AZRI, Sylvie LANIEPCE, Haiming ZHENG

IMT/OLPS/ASE/SEC/NPS

Orange Labs, Caen Jalel Ben-Othman

L2TI laboratory

Paris13

Symposium sur la sécurité des technologies de l'information et des communications. SSTIC’14. Friday 6th June, 2014. Rennes.

slide-2
SLIDE 2

unrestricted

Outline

  • Problem Definition
  • Dynamic Resource Management Vulnerability

– VMware Distributed Resource Scheduler (DRS) algorithm analysis – Attack scheme – Cluster vulnerability assessment

  • Demonstration
  • Conclusion

1

slide-3
SLIDE 3

unrestricted

Scope

  • Elasticity <-> Dynamicity (today)

– Resource Overcommitment – VM Migration

1

  • Domain of new vulnerabilities appeared with cloud (virtualization)
  • Resource Sharing & Multi-tenancy: cross-Virtual Machine attacks

(cross-VM)

  • Dynamic resource management
slide-4
SLIDE 4

unrestricted

Resource sharing and dynamic resource allocation

  • Demonstrate that dynamic resource management systems might be vulnerable to

malicious manipulation of VM resource consumption

  • Abuse: cause the resource management system to trigger

er VM migrat ation ions Cost for both the infrastructure and migrated VMs Dynamic Resource Management System

Malicio ious VM VM Input : Quantity ty of consummed resource ces (Malicious+Normal VMs) Output : Decision

  • ns impact
  • Normal VMs
  • Infrastructure

Shared Resource Pool

  • > Fate-shari

ring Malicio ious VM VM Normal VM Normal VM Normal VM Normal VM

2

slide-5
SLIDE 5

unrestricted

Distributed Resource Scheduler Algorithm (DRS, VMware)

source: VMware vSphere 4.1 HA and DRS. technical Deepdive. D.Epping et F. Denneman

Constraint Correction calculate chlsd

Ic > It

While cluster imbalanced: GetBestMove For each VM in the cluster simulate vMotion and calculate CHLSD While cluster imbalanced: GetBestMove Weight Costs vs. Benefits vs. Risks Return migration that does not exceed CBR threshold Add to migration recommendation list and give a priority rating

Re Re-ca calcul ulate Ic

Do nothing Apply migration Done

balanc nced ed unba balanc nced ed yes no no

Ic: Curr rren ent Imbalan lance ce

(chlsd: Curr rrent t Host Load S Standard Deviation tion)

It: Target et Imbalance lance

(thlsd: : Target t Host Load Standard Deviation tion)

3

slide-6
SLIDE 6

unrestricted

DRS: Target Imbalance (It ) analysis It =

𝐷𝑝𝑜𝑡𝑢𝑏𝑜𝑢𝐵𝑕𝑕𝑠𝑓𝑡𝑡𝑗𝑤𝑓𝑜𝑓𝑡𝑡 𝐷𝑚𝑣𝑡𝑢𝑓𝑠 𝑇𝑗𝑨𝑓

Four Aggressiveness Levels enabling dynamic migrations:

  • Moderately Conservative
  • Moderate (Default)
  • Moderately Aggressive
  • Aggressive

Abusive VM Migration Attack: deliberately manipulate the quantity of resources consumed by VMs to enforce DRS to trigger VM migrations : Ic > It

4

slide-7
SLIDE 7

unrestricted

Experimentation Setup

Context 5 Hosts

  • 16 GB of RAM each
  • 8 CPU x 2.133 GHz each
  • VMs / Host = 10

% Overcommitment

  • Mem = 13.18% (17.5 GB)
  • CPU = 25% (10 vCPU)

Resource Usage in normal VMs

  • Real private IaaS cloud traces

DRS vMotion

vCenter Management Server (VMware)

Load Generator

Virtual Platform Analysis Tools (Orange Labs)

5

Diagnosis Monitoring

slide-8
SLIDE 8

unrestricted

Abusive VM Migration Attack: one shot

6

slide-9
SLIDE 9

unrestricted

Attack conditions:

  • Attacker coordinates VMs on two different hosts
  • VMs fluctuate their resource consumption in phase opposition

between the two hosts

Coordinated Abusive VM Migration Attack: Serial Migration

Fig.1 .1 – Attacke acker VM Fig. . 2 - Imbalanc alance 7

slide-10
SLIDE 10

unrestricted

Vulnerability Measurement (small cluster)

Minimum quantity of resources to be under the control of the attacker? Cluster vulnerability is high when this quantity is low

0, 0,5 1 1, 1,5 2 2, 2,5 3

2 3 4 5

Vulnera rabil ility ity increas ases s when cluster r size e increas ases Vulnera rabil ility ity increas ases s when DRS Aggr gressi sivenes ess s increas ases

5 10 10 15 15

2 3 4 5 Cluster Size (N) Minimum Required Resource

2 4 6 8 10 10 12 12

2 3 4 5 Moderate (Default) Minimum Required Resource Cluster Size (N) Minimum Required Resource Cluster Size (N)

11,5 11 11 10,5 10 10 2,5

Agressive

5

1 2 3 4 5 6

2 3 4 5 Minimum Required Resource Cluster Size (N) Moderately Aggressive Moderately Conservative

14 14

CPU (vCPU)

Memory (GB)

Context:‘one shot’ Abusive VM Migration attack, execution context described in slide 8

8

slide-11
SLIDE 11

unrestricted

Demonstration

19

slide-12
SLIDE 12

unrestricted

Conclusion

  • How to autonomously mitigate such threats ?

– Proact ctiv ive Integrating security considerations in dynamic resource management systems design? – React ctiv ive Autonomic Monitoring and detection of malicious resource consumption profiles

  • How to characterize such profiles?
  • How to deal with these profiles?

10

slide-13
SLIDE 13

unrestricted

Thank you Questions?