ATSSC: An Attack Tolerant System in Serverless Computing

被引:0
作者
Zhang, Shuai [1 ]
Guo, Yunfei [1 ]
Hu, Hongchao [1 ]
Liu, Wenyan [1 ]
Wang, Yawen [1 ]
机构
[1] Informat Engn Univ, Zhengzhou 450002, Peoples R China
基金
中国国家自然科学基金;
关键词
active defense; attack tolerant; cloud com- puting; security; serverless computing;
D O I
10.23919/JCC.fa.2021-0635.202406
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Serverless computing is a promising paradigm in cloud computing that greatly simplifies cloud programming. With serverless computing, developers only provide function code to serverless platform, and these functions are invoked by its driven events. Nonetheless, security threats in serverless computing such as vulnerability -based security threats have become the pain point hindering its wide adoption. The ideas in proactive defense such as redundancy, diversity and dynamic provide promising approaches to protect against cyberattacks. However, these security technologies are mostly applied to serverless platform based on "stacked" mode, as they are designed independent with serverless computing. The lack of security consideration in the initial design makes it especially challenging to achieve the all life cycle protection for serverless application with limited cost. In this paper, we present ATSSC, a proactive defense enabled attack tolerant serverless platform. ATSSC integrates the characteristic of redundancy, diversity and dynamic into serverless seamless to achieve high-level security and efficiency. Specifically, ATSSC constructs multiple diverse function replicas to process the driven events and performs cross -validation to verify the results. In order to create diverse function replicas, both software diversity and environment diversity are adopted. Furthermore, a dynamic function refresh strategy is proposed to keep the clean state of serverless functions. We implement ATSSC based on Kubernetes and Knative. Analysis and experimental results demonstrate that ATSSC can effectively protect serverless computing against cyberattacks with acceptable costs.
引用
收藏
页码:192 / 205
页数:14
相关论文
共 32 条
  • [21] Oakes E, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P57
  • [22] Patnayakuni R., 2018, WISP 2018 Proceedings
  • [23] Pu QF, 2019, PROCEEDINGS OF THE 16TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, P193
  • [24] Workflow Integration Alleviates Identity and Access Management in Serverless Computing
    Sankaran, Arnav
    Datta, Pubali
    Bates, Adam
    [J]. 36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), 2020, : 496 - 509
  • [25] A Survey of Moving Target Defenses for Network Security
    Sengupta, Sailik
    Chowdhary, Ankur
    Sabur, Abdulhakim
    Alshamrani, Adel
    Huang, Dijiang
    Kambhampati, Subbarao
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (03): : 1909 - 1941
  • [26] Tariq Ali, 2020, SoCC '20: Proceedings of the 11th ACM Symposium on Cloud Computing, P311, DOI 10.1145/3419111.3421306
  • [27] Cloning Your Gadgets: Complete ROP Attack Immunity with Multi-Variant Execution
    Volckaert, Stijn
    Coppens, Bart
    De Sutter, Bjorn
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (04) : 437 - 450
  • [28] Wang L, 2018, PROCEEDINGS OF THE 2018 USENIX ANNUAL TECHNICAL CONFERENCE, P133
  • [29] CLOSURE: A cloud scientific workflow scheduling algorithm based on attack-defense game model
    Wang, Yawen
    Guo, Yunfei
    Guo, Zehua
    Baker, Thar
    Liu, Wenyan
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 460 - 474
  • [30] Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing
    Wu, Jun
    Dong, Mianxiong
    Ota, Kaoru
    Li, Jianhua
    Yang, Wu
    [J]. IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2020, 5 (03): : 341 - 352