Sync-Millibottleneck Attack on Microservices Cloud Architecture

被引:2
作者
Gu, Xuhang [1 ]
Wang, Qingyang [1 ]
Yan, Qiben [2 ]
Liu, Jianshu [1 ]
Pu, Calton [3 ]
机构
[1] Louisiana State Univ, Baton Rouge, LA 70803 USA
[2] Michigan State Univ, E Lansing, MI 48824 USA
[3] Georgia Inst Technol, Atlanta, GA 30332 USA
来源
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024 | 2024年
基金
美国国家科学基金会;
关键词
Microservices; DDoS attack; Long tail latency; SLA violations;
D O I
10.1145/3634737.3644991
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The modern web services landscape is characterized by numerous fine-grained, loosely coupled microservices with increasingly stringent low-latency requirements. However, this architecture also brings new performance vulnerabilities. In this paper, we introduce a novel low-volume application layer DDoS attack called the Sync-Millibottleneck (SyncM) attack, specifically targeting microservices. The goal of this attack is to cause a long-tail latency problem that violates the service-level agreement (SLA) while evading state-of-the-art DDoS detection/defense mechanisms. The SyncM attack exploits two unique features of microservices architecture: (1) the shared frontend gateway that directs user requests to mid-tier/backend microservices, and (2) the co-existence of multiple logically independent execution paths, each with its own bottleneck resource. By creating synchronized millibottlenecks (i.e., sub-second duration bottlenecks) on multiple independent execution paths, SyncM attack can cause the queuing effect in each execution path to be propagated and superimposed in the shared frontend gateway. As a result, SyncM triggers surprisingly high latency spikes in the system, even when all system resources are far from saturation, making it challenging to trace the cause of performance instability. To evaluate the practicality of the SyncM attack, we conduct extensive experiments on real cloud systems such as EC2 and Azure, which are equipped with state-of-the-art IDS/IPS systems. We also conduct a large-scale simulation using a production Alibaba trace to show the scalability of our attack. Our results demonstrate that the SyncM attack is highly effective, as it only consumes less than 15% of additional CPU resources of the target system while increasing its 95th percentile response time by more than 20 times.
引用
收藏
页码:1157 / 1171
页数:15
相关论文
共 76 条
  • [1] Acar G., 2013, Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, CCS '13, P1129
  • [2] Akamai, 2020, Credential Stuffing in the Media Industry
  • [3] AI-Enabled Secure Microservices in Edge Computing: Opportunities and Challenges
    Al-Doghman, Firas
    Moustafa, Nour
    Khalil, Ibrahim
    Sohrabi, Nasrin
    Tari, Zahir
    Zomaya, Albert Y.
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (02) : 1485 - 1504
  • [4] AWS, 2022, Amazon EC2
  • [5] AWS, 2022, Metrics. Amazon AWS. AWS CloudWatch Custom
  • [6] AWS Shield, 2019, Lower Threshold for AWS WAF Rate-based Rules
  • [7] Microservices Made Attack-Resilient Using Unsupervised Service Fissioning
    Baarzi, Ataollah Fatahi
    Kesidis, George
    Fleck, Daniel
    Stavrou, Angelos
    [J]. PROCEEDINGS OF THE 13TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2020), 2018, : 31 - 36
  • [8] Barr Jeff, 2014, Rapid Auto Scaling with Amazon SQS
  • [9] Bertoli Marco, 2009, Performance Evaluation Review, V36, P10, DOI 10.1145/1530873.1530877
  • [10] Cambiaso E., 2012, International Conference on Security in Computer Networks and Distributed Systems, P195