ATSSC: An Attack Tolerant System in Serverless Computing

被引:0
作者
Zhang, Shuai [1 ]
Guo, Yunfei [1 ]
Hu, Hongchao [1 ]
Liu, Wenyan [1 ]
Wang, Yawen [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450002, Peoples R China
基金
中国国家自然科学基金;
关键词
active defense; attack tolerant; cloud com- puting; security; serverless computing;
D O I
10.23919/JCC.fa.2021-0635.202406
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming. With serverless computing, developers only provide function code to serverless platform, and these functions are invoked by its driven events. Nonetheless, security threats in serverless computing such as vulnerability -based security threats have become the pain point hindering its wide adoption. The ideas in proactive defense such as redundancy, diversity and dynamic provide promising approaches to protect against cyberattacks. However, these security technologies are mostly applied to serverless platform based on "stacked" mode, as they are designed independent with serverless computing. The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost. In this paper, we present ATSSC, a proactive defense enabled attack tolerant serverless platform. ATSSC integrates the characteristic of redundancy, diversity and dynamic into serverless seamless to achieve high-level security and efficiency. Specifically, ATSSC constructs multiple diverse function replicas to process the driven events and performs cross -validation to verify the results. In order to create diverse function replicas, both software diversity and environment diversity are adopted. Furthermore, a dynamic function refresh strategy is proposed to keep the clean state of serverless functions. We implement ATSSC based on Kubernetes and Knative. Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs.
引用
收藏
页码:192 / 205
页数:14
相关论文
共 32 条
  • [1] Ai JJ, 2019, CHINA COMMUN, V16, P129
  • [2] Secure Serverless Computing using Dynamic Information Flow Control
    Alpernas K.
    Flanagan C.
    Fouladi S.
    Ryzhyk L.
    Sagiv M.
    Winstein K.
    [J]. Proceedings of the ACM on Programming Languages, 2018, 2 (OOPSLA)
  • [3] [Anonymous], 2021, Nessus
  • [4] [Anonymous], 2021, National Vulnerability Database
  • [5] [Anonymous], 2021, Knative
  • [6] [Anonymous], 2021, Kubernetes
  • [7] Arnautov S, 2016, PROCEEDINGS OF OSDI'16: 12TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P689
  • [8] Baldini I, 2017, Serverless Computing: Current Trends and Open Problems, P1
  • [9] MTD CBITS: Moving Target Defense for Cloud-Based IT Systems
    Bardas, Alexandru G.
    Sundaramurthy, Sathya Chandran
    Ou, Xinming
    DeLoach, Scott A.
    [J]. COMPUTER SECURITY - ESORICS 2017, PT I, 2018, 10492 : 167 - 186
  • [10] Leveraging the Serverless Architecture for Securing Linux Containers
    Bila, Nilton
    Dettori, Paolo
    Kanso, Ali
    Watanabe, Yuji
    Youssef, Alaa
    [J]. 2017 IEEE 37TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2017, : 401 - 404