Generating Realistic Attack Data for Microservices: Framework and Case Study

被引:0
作者
Castro, Jessica [1 ]
Laranjeiro, Nuno [1 ]
Vieira, Marco [1 ]
机构
[1] Univ Coimbra, CISUC, DEI, Coimbra, Portugal
来源
PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023 | 2023年
关键词
microservices; container; security; DoS attack; testbed;
D O I
10.1145/3615366.3615377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Microservice applications have gained significant popularity due to their capability to decrease the complexity of developing highly scalable, manageable, and flexible systems. However, the microservices distributed nature, fine service granularity, and large attack surface introduce new security challenges, making it crucial to develop effective mechanisms for protecting those applications at runtime. Nevertheless, developing novel solutions relies on the availability of suitable datasets, which are currently lacking and need to be generated through new research. This research paper presents a comprehensive framework designed to support research on monitoring and analyzing microservices, aiding in the development of novel solutions for detecting attacks in the context of microservice applications. We present an implementation of the framework for generating data for high- and low-volume Denial of Service (DoS) attacks, highlighting its key components and features. Furthermore, we present a series of attack profiles and evaluate the framework's performance in a case study, demonstrating the framework's usefulness for generating data for DoS attacks by presenting a model that successfully detects the attacks.
引用
收藏
页码:60 / 69
页数:10
相关论文
共 50 条
[31]   Microservices for Continuous Deployment, Monitoring and Validation in Cyber-Physical Systems: an Industrial Case Study for Elevators Systems [J].
Gartziandia, Aitor ;
Ayerdi, Jon ;
Arrieta, Aitor ;
Ali, Shaukat ;
Yue, Tao ;
Agirre, Aitor ;
Sagardui, Goiuria ;
Arratibel, Maite .
2021 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE ARCHITECTURE COMPANION (ICSA-C), 2021, :46-53
[32]   Data Acquisition Framework for Micromobility Vehicles Toward Driving Risk Prediction Against Cyberphysical Security Attack [J].
Sato, Shunsuke ;
Shinkuma, Ryoichi ;
Hirai, Kensei ;
Nakahara, Masataka ;
Okui, Norihiro ;
Kubota, Ayumu ;
Kobayashi, Yasuaki ;
Sugiyama, Keizo ;
Nishio, Takayuki .
IEEE SECURITY & PRIVACY, 2025, 23 (02) :61-70
[33]   Horizontal Offloading Mechanism for IoT Application in Fog Computing Using Microservices Case Study: Traffic Management System [J].
Mostafa, Mostafa Abd Al-Azim ;
Khater, Ahmad Mohammad .
2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, :640-647
[34]   Novel attack-defense framework for nonlinear complex networks: An important-data-based method [J].
Wang, Xun ;
Tian, Engang ;
Wei, Bin ;
Liu, Jinliang .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2023, 33 (04) :2861-2878
[35]   Distributed Attack Detection in a Water Treatment Plant: Method and Case Study [J].
Adepu, Sridhar ;
Mathur, Aditya .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :86-99
[36]   A Study of the Data Security Attack and Defense Pattern in a Centralized UAV-Cloud Architecture [J].
Airlangga, Gregorius ;
Liu, Alan .
DRONES, 2023, 7 (05)
[37]   ANALYSIS OF SQL INJECTION ATTACK IN WEB SERVICE (A CASE STUDY OF WEBSITE IN ACEH PROVINCE) [J].
Munadi, Rizal ;
Fajri, T. Surya ;
Meutia, Ernita Dewi ;
Elizar .
PROCEEDINGS OF 2013 3RD INTERNATIONAL CONFERENCE ON INSTRUMENTATION, COMMUNICATIONS, INFORMATION TECHNOLOGY, AND BIOMEDICAL ENGINEERING (ICICI-BME), 2013, :431-435
[38]   A machine learning framework for investigating data breaches based on semantic analysis of adversary's attack patterns in threat intelligence repositories [J].
Noor, Umara ;
Anwar, Zahid ;
Malik, Asad Waqar ;
Khan, Sharifullah ;
Saleem, Shahzad .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 95 :467-487
[39]   A comprehensive approach, and a case study, for conducting attack detection experiments in Cyber-Physical Systems [J].
Sabaliauskaite, Giedre ;
Ng, Geok See ;
Ruths, Justin ;
Mathur, Aditya .
ROBOTICS AND AUTONOMOUS SYSTEMS, 2017, 98 :174-191
[40]   Classification and Analysis of Adversarial Machine Learning Attacks in IoT: a Label Flipping Attack Case Study [J].
Abrishami, Mahdi ;
Dadkhah, Sajjad ;
Pinto Neto, Euclides Carlos ;
Xiong, Pulei ;
Iqbal, Shahrear ;
Ray, Suprio ;
Ghorbani, Ali A. .
2022 32ND CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2022, :3-14