Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

被引:22
作者
Ficco, Massimo [1 ]
Palmieri, Francesco [1 ]
机构
[1] Univ Naples 2, Dept Ind & Informat Engn, I-81031 Aversa, Italy
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Cloud infrastructures; denial of service; fraudulent energy consumption; intrusion prevention; low-rate attacks; RATE DOS ATTACK; SECURITY; DEFENSE;
D O I
10.1109/JSYST.2015.2414822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, cloud computing is the target business environment for many enterprises and government organizations. However, despite the huge potential gains that can be achieved, security represents a fundamental issue, which prevents the massive cloud adoption inmission-critical Information Technology sectors. The most common security issues are amplified in the cloud environment since new complex features, with their inherent weaknesses, enter into the problem space, particularly those associated to multitenancy and elasticity. Thus, new threats, such as the energy-related denial-of-service attacks against large-scale cloud infrastructures, may involve not only the quality of the delivered services but also their operational costs in terms of energy bill. The longer is the time necessary to identify such attacks, the heavier is the impact on the overall energy consumption and, consequently, on the associated expenses. This work presents a detailed analysis of such new sophisticated menaces, by focusing on those that are specifically tailored to originate the worst-case energy demands by leveraging properly crafted low-rate traffic patterns in order to ensure stealth operations. We present some strategies exploiting the cloud flexibility in order to increase in a fraudulent way the overall energy consumption and analyze their impact within large-scale cloud infrastructures. This should help cloud providers in understanding such weaknesses and highlighting their root causes, as well as in providing some hints on how they can counter these subtle security issues.
引用
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
[21]   Denial of Service Attacks Mitigation in the Cloud [J].
Alosaimi, Wael ;
Zak, Michal ;
Al-Begain, Khalid .
2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, :47-53
[22]   Detecting Denial of Service Attacks in the Cloud [J].
Kumar, Raneel ;
Lal, Sunil Pranit ;
Sharma, Alok .
2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, :309-316
[23]   Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking [J].
Li, Yue ;
Liu, Yingjian ;
Wang, Yu ;
Guo, Zhongwen ;
Yin, Haoyu ;
Teng, Hao .
IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2020, :1569-1578
[24]   Securing wireless mobile nodes from distributed denial-of-service attacks [J].
Varadharajan, Vijay ;
Tupakula, Udaya .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15) :3794-3815
[25]   Classifying different denial-of-service attacks in cloud computing using rule-based learning [J].
Khorshed, Md Tanzim ;
Ali, A. B. M. Shawkat ;
Wasimi, Saleh A. .
SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) :1235-1247
[26]   Detection and Prevention of Denial-of-Service in Cloud-based Smart Grid [J].
Razaq, Abdul ;
Hussain, Muhammad Majid ;
Javed, Waqas ;
Javed, Tasmiyah ;
Memon, Zulfiqar A. .
PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SMART CITIES AND GREEN ICT SYSTEMS (SMARTGREENS), 2021, :172-179
[27]   Detection of Denial-of-Service Attacks Based on Computer Vision Techniques [J].
Tan, Zhiyuan ;
Jamdagni, Aruna ;
He, Xiangjian ;
Nanda, Priyadarsi ;
Liu, Ren Ping ;
Hu, Jiankun .
IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) :2519-2533
[28]   LQG Control under Denial-of-Service Attacks: An Experimental Study [J].
Tang, Haiding ;
Lu, Zhouzheng ;
Zhang, Lifu ;
Chen, Yang ;
Cheng, Peng ;
Chen, Jiming .
PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,
[29]   Design and development of proactive solutions for mitigating denial-of-service attacks [J].
Nagesh, H. R. ;
Sekaran, K. Chandra .
2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, :152-+
[30]   Stability analysis of networked control systems with denial-of-service attacks [J].
Zhang, Jin ;
Peng, Chen ;
Masroor, Suhaib ;
Sun, Hongtao ;
Chai, Lin .
2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,