Warmonger Attack: A Novel Attack Vector in Serverless Computing

被引:0
|
作者
Xiong, Junjie [1 ]
Wei, Mingkui [2 ]
Lu, Zhuo [3 ]
Liu, Yao [1 ]
机构
[1] Univ S Florida, Dept Comp Sci & Engn, Tampa, FL 33620 USA
[2] George Mason Univ, Dept Cybersecur Engn, Fairfax, VA 22030 USA
[3] Univ S Florida, Dept Elect Engn, Tampa, FL 33620 USA
关键词
IP networks; Codes; Serverless computing; Costs; Vectors; Hardware; Computational modeling; Cloud computing; edge computing; serverless functions; denial-of-service; DEFENSE;
D O I
10.1109/TNET.2024.3437432
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We debut the Warmonger attack, a novel attack vector that can cause denial-of-service between a serverless computing platform and an external content server. The Warmonger attack exploits the fact that a serverless computing platform shares the same set of egress IPs among all serverless functions, which belong to different users, to access an external content server. As a result, a malicious user on this platform can purposefully misbehave and cause these egress IPs to be blocked by the content server, resulting in a platform-wide denial of service. To validate the effectiveness of the Warmonger attack, we conducted extensive experiments over several months, collecting and analyzing the egress IP usage patterns of five prominent serverless service providers (SSPs): Amazon Web Service (AWS) Lambda, Google App Engine, Microsoft Azure Functions, Cloudflare Workers, and Alibaba Function Compute. Additionally, we conducted a thorough evaluation of the attacker's potential actions to compromise an external server and trigger IP blocking. Our findings revealed that certain SSPs employ surprisingly small sets of egress IPs, sometimes as few as four, which are shared among their user base. Furthermore, our research demonstrates that the serverless platform offers ample opportunities for malicious users to engage in well-known disruptive behaviors, ultimately resulting in IP blocking. Our study uncovers a significant security threat within the burgeoning serverless computing platform and sheds light on potential mitigation strategies, such as the detection of malicious serverless functions and the isolation of such entities.
引用
收藏
页码:4826 / 4841
页数:16
相关论文
共 50 条
  • [21] SlowDroid: Turning a Smartphone into a Mobile Attack Vector
    Cambiaso, Enrico
    Papaleo, Gianluca
    Aiello, Maurizio
    2014 INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD (FICLOUD), 2014, : 405 - 410
  • [22] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Yan, Junwei
    Jiang, Tao
    Lin, Liwei
    Wu, Zhengyu
    Ye, Xiucai
    Tian, Mengke
    Wang, Yong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2023, 2023 (01)
  • [23] A novel Sybil attack detection scheme in mobile IoT based on collaborate edge computing
    Junwei Yan
    Tao Jiang
    Liwei Lin
    Zhengyu Wu
    Xiucai Ye
    Mengke Tian
    Yong Wang
    EURASIP Journal on Wireless Communications and Networking, 2023
  • [24] Serverless and Deviceless Dew Computing: Founding an Infrastructureless Computing
    Gusev, Marjan
    2021 IEEE 45TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2021), 2021, : 1814 - 1818
  • [25] Catabolism attack and Anabolism defense: A novel attack and traceback mechanism in Opportunistic Networks
    Alajeely, Majeed
    Doss, Robin
    Ahmad, Asma'a
    Mak-Hau, Vicky
    COMPUTER COMMUNICATIONS, 2015, 71 : 111 - 118
  • [26] Deep Learning Enabled Data Offloading With Cyber Attack Detection Model in Mobile Edge Computing Systems
    Gopalakrishnan, T.
    Ruby, D.
    Al-Turjman, Fadi
    Gupta, Deepak
    Pustokhina, Irina V.
    Pustokhin, Denis A.
    Shankar, K.
    IEEE ACCESS, 2020, 8 : 185938 - 185949
  • [27] Smart Nutrition Monitoring System Using Serverless Edge Computing
    Javadi, Bahman
    Khan, Arman
    Jayasuriya, Namal
    Guo, Yi
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (03) : 6363 - 6375
  • [28] Serverless Architecture - A Revolution in Cloud Computing
    Rajan, Arokia Paul
    2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 88 - 93
  • [29] Response to Multiple Attack Behaviour Models in Cloud Computing
    Liu, Xu
    Di, Xiaoqiang
    Li, Jinqing
    Yang, Huamin
    Cong, Ligang
    Zhao, Jianping
    ADVANCED HYBRID INFORMATION PROCESSING, 2018, 219 : 489 - 496
  • [30] SYN Flooding Attack Detection Based on Entropy Computing
    Bellaiche, Martine
    Gregoire, Jean-Charles
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1079 - 1084