Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

被引:22
作者
Ficco, Massimo [1 ]
Palmieri, Francesco [1 ]
机构
[1] Univ Naples 2, Dept Ind & Informat Engn, I-81031 Aversa, Italy
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Cloud infrastructures; denial of service; fraudulent energy consumption; intrusion prevention; low-rate attacks; RATE DOS ATTACK; SECURITY; DEFENSE;
D O I
10.1109/JSYST.2015.2414822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, cloud computing is the target business environment for many enterprises and government organizations. However, despite the huge potential gains that can be achieved, security represents a fundamental issue, which prevents the massive cloud adoption inmission-critical Information Technology sectors. The most common security issues are amplified in the cloud environment since new complex features, with their inherent weaknesses, enter into the problem space, particularly those associated to multitenancy and elasticity. Thus, new threats, such as the energy-related denial-of-service attacks against large-scale cloud infrastructures, may involve not only the quality of the delivered services but also their operational costs in terms of energy bill. The longer is the time necessary to identify such attacks, the heavier is the impact on the overall energy consumption and, consequently, on the associated expenses. This work presents a detailed analysis of such new sophisticated menaces, by focusing on those that are specifically tailored to originate the worst-case energy demands by leveraging properly crafted low-rate traffic patterns in order to ensure stealth operations. We present some strategies exploiting the cloud flexibility in order to increase in a fraudulent way the overall energy consumption and analyze their impact within large-scale cloud infrastructures. This should help cloud providers in understanding such weaknesses and highlighting their root causes, as well as in providing some hints on how they can counter these subtle security issues.
引用
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
  • [21] Detecting Denial of Service Attacks in the Cloud
    Kumar, Raneel
    Lal, Sunil Pranit
    Sharma, Alok
    2016 IEEE 14TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 14TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 2ND INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/DATACOM/CYBERSC, 2016, : 309 - 316
  • [22] Securing wireless mobile nodes from distributed denial-of-service attacks
    Varadharajan, Vijay
    Tupakula, Udaya
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (15) : 3794 - 3815
  • [23] Classifying different denial-of-service attacks in cloud computing using rule-based learning
    Khorshed, Md Tanzim
    Ali, A. B. M. Shawkat
    Wasimi, Saleh A.
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (11) : 1235 - 1247
  • [24] Denial of Service Attacks Mitigation in the Cloud
    Alosaimi, Wael
    Zak, Michal
    Al-Begain, Khalid
    2015 9TH INTERNATIONAL CONFERENCE ON NEXT GENERATION MOBILE APPLICATIONS, SERVICES AND TECHNOLOGIES (NGMAST 2015), 2015, : 47 - 53
  • [25] Detection and Prevention of Denial-of-Service in Cloud-based Smart Grid
    Razaq, Abdul
    Hussain, Muhammad Majid
    Javed, Waqas
    Javed, Tasmiyah
    Memon, Zulfiqar A.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SMART CITIES AND GREEN ICT SYSTEMS (SMARTGREENS), 2021, : 172 - 179
  • [26] Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
    Tan, Zhiyuan
    Jamdagni, Aruna
    He, Xiangjian
    Nanda, Priyadarsi
    Liu, Ren Ping
    Hu, Jiankun
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (09) : 2519 - 2533
  • [27] LQG Control under Denial-of-Service Attacks: An Experimental Study
    Tang, Haiding
    Lu, Zhouzheng
    Zhang, Lifu
    Chen, Yang
    Cheng, Peng
    Chen, Jiming
    PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,
  • [28] Design and development of proactive solutions for mitigating denial-of-service attacks
    Nagesh, H. R.
    Sekaran, K. Chandra
    2006 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, VOLS 1 AND 2, 2007, : 152 - +
  • [29] Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks
    Riecker, Michael
    Thies, Daniel
    Hollick, Matthias
    2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, : 296 - 304
  • [30] Stability analysis of networked control systems with denial-of-service attacks
    Zhang, Jin
    Peng, Chen
    Masroor, Suhaib
    Sun, Hongtao
    Chai, Lin
    2016 UKACC 11TH INTERNATIONAL CONFERENCE ON CONTROL (CONTROL), 2016,