Generating Realistic Attack Data for Microservices: Framework and Case Study

被引:0
作者
Castro, Jessica [1 ]
Laranjeiro, Nuno [1 ]
Vieira, Marco [1 ]
机构
[1] Univ Coimbra, CISUC, DEI, Coimbra, Portugal
来源
PROCEEDINGS OF12TH LATIN-AMERICAN SYMPOSIUM ON DEPENDABLE AND SECURE COMPUTING, LADC 2023 | 2023年
关键词
microservices; container; security; DoS attack; testbed;
D O I
10.1145/3615366.3615377
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Microservice applications have gained significant popularity due to their capability to decrease the complexity of developing highly scalable, manageable, and flexible systems. However, the microservices distributed nature, fine service granularity, and large attack surface introduce new security challenges, making it crucial to develop effective mechanisms for protecting those applications at runtime. Nevertheless, developing novel solutions relies on the availability of suitable datasets, which are currently lacking and need to be generated through new research. This research paper presents a comprehensive framework designed to support research on monitoring and analyzing microservices, aiding in the development of novel solutions for detecting attacks in the context of microservice applications. We present an implementation of the framework for generating data for high- and low-volume Denial of Service (DoS) attacks, highlighting its key components and features. Furthermore, we present a series of attack profiles and evaluate the framework's performance in a case study, demonstrating the framework's usefulness for generating data for DoS attacks by presenting a model that successfully detects the attacks.
引用
收藏
页码:60 / 69
页数:10
相关论文
共 50 条
[41]   A Case Study of a Systematic Attack Design Method for Critical Infrastructure Cyber-Physical Systems [J].
Grimsman, D. ;
Chetty, V. ;
Woodbury, N. ;
Vaziripour, E. ;
Roy, S. ;
Zappala, D. ;
Warnick, S. .
2016 AMERICAN CONTROL CONFERENCE (ACC), 2016, :296-301
[42]   Vaudenay's Privacy Model in the Universal Composability Framework: A Case Study [J].
Chabanne, Herve ;
Chevalier, Celine .
SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 187 :16-+
[43]   Development of Framework for Privacy Information Protection - Case Study and Issue in Korea [J].
Hong, Seng-phil ;
Kim, Kyong-jin ;
Kang, Sungmin ;
Kim, Jaehyoun .
INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2010, 13 (03) :607-620
[44]   Business Impact Analysis of AMM Data: A Case Study [J].
Horalek, Josef .
APPLIED SYSTEM INNOVATION, 2023, 6 (05)
[45]   The Costs of Anonymization: Case Study Using Clinical Data [J].
Pilgram, Lisa ;
Meurers, Thierry ;
Malin, Bradley ;
Schaeffner, Elke ;
Eckardt, Kai-Uwe ;
Prasser, Fabian .
JOURNAL OF MEDICAL INTERNET RESEARCH, 2024, 26
[46]   Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application [J].
Wulandari, Nuri ;
Adnan, Mohammad Syauqi ;
Wicaksono, Chastio Bayu .
HUMAN BEHAVIOR AND EMERGING TECHNOLOGIES, 2022, 2022
[47]   Dynamic Security Level Changing Strategy using Attack Predictions Case Study of TCP SYN Attacks [J].
Lim, Sung-Hwa ;
Kim, Jai-Hoon .
2014 INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS), 2014,
[48]   Framework for critical information infrastructure protection in smart government: a case study in Indonesia [J].
Putro, Prasetyo Adi Wibowo ;
Sensuse, Dana Indra ;
Wibowo, Wahyu Setiawan Setiawan .
INFORMATION AND COMPUTER SECURITY, 2024, 32 (01) :112-129
[49]   A case study on implementing a flexible IIoT service framework for the integration of machine tools [J].
Chen, Wen-Ching ;
Ji, Bo-Yu ;
Chen, Hung-Hsiang .
JOURNAL OF INDUSTRIAL INFORMATION INTEGRATION, 2025, 47
[50]   A Framework for Detecting Intentions of Criminal Acts in Social Media: A Case Study on Twitter [J].
de Mendonca, Ricardo Resende ;
de Brito, Daniel Felix ;
Rosa, Ferrucio de Franco ;
dos Reis, Julio Cesar ;
Bonacin, Rodrigo .
INFORMATION, 2020, 11 (03)