Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

被引:22
作者
Ficco, Massimo [1 ]
Palmieri, Francesco [1 ]
机构
[1] Univ Naples 2, Dept Ind & Informat Engn, I-81031 Aversa, Italy
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Cloud infrastructures; denial of service; fraudulent energy consumption; intrusion prevention; low-rate attacks; RATE DOS ATTACK; SECURITY; DEFENSE;
D O I
10.1109/JSYST.2015.2414822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, cloud computing is the target business environment for many enterprises and government organizations. However, despite the huge potential gains that can be achieved, security represents a fundamental issue, which prevents the massive cloud adoption inmission-critical Information Technology sectors. The most common security issues are amplified in the cloud environment since new complex features, with their inherent weaknesses, enter into the problem space, particularly those associated to multitenancy and elasticity. Thus, new threats, such as the energy-related denial-of-service attacks against large-scale cloud infrastructures, may involve not only the quality of the delivered services but also their operational costs in terms of energy bill. The longer is the time necessary to identify such attacks, the heavier is the impact on the overall energy consumption and, consequently, on the associated expenses. This work presents a detailed analysis of such new sophisticated menaces, by focusing on those that are specifically tailored to originate the worst-case energy demands by leveraging properly crafted low-rate traffic patterns in order to ensure stealth operations. We present some strategies exploiting the cloud flexibility in order to increase in a fraudulent way the overall energy consumption and analyze their impact within large-scale cloud infrastructures. This should help cloud providers in understanding such weaknesses and highlighting their root causes, as well as in providing some hints on how they can counter these subtle security issues.
引用
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
[31]   Statistical signatures for early detection of flooding denial-of-service attacks [J].
Haggerty, J ;
Shi, Q ;
Merabti, M .
SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 :327-341
[32]   Measuring the Impact of Denial-of-Service Attacks on Wireless Sensor Networks [J].
Riecker, Michael ;
Thies, Daniel ;
Hollick, Matthias .
2014 IEEE 39TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2014, :296-304
[33]   Blockchain Signaling System (BloSS): Cooperative Signaling of Distributed Denial-of-Service Attacks [J].
Rodrigues, Bruno ;
Scheid, Eder ;
Killer, Christian ;
Franco, Muriel ;
Stiller, Burkhard .
JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2020, 28 (04) :953-989
[34]   IP Address-Based Mitigation Against Denial-of-Service Flooding Attacks [J].
Patil, Arvind R. Bhagat ;
Thakur, Nileshsingh, V .
INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 :377-389
[35]   Hashcash Tree, a Data Structure to Mitigate Denial-of-Service Attacks [J].
Alviano, Mario .
ALGORITHMS, 2023, 16 (10)
[36]   Novel Denial-of-Service Attacks Against LoRaWAN on MAC Layer [J].
Chen, Mi ;
Ben-Othman, Jalel ;
Mokdad, Lynda .
IEEE COMMUNICATIONS LETTERS, 2023, 27 (11) :3123-3126
[37]   Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter [J].
Blenn, Norbert ;
Ghiette, Vincent ;
Doerr, Christian .
PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
[38]   Could emerging fraudulent energy consumption attacks make the cloud infrastructure costs unsustainable? [J].
Ficco, Massimo .
INFORMATION SCIENCES, 2019, 476 :474-490
[39]   Intrusion Prevention Against Distributed Denial-of-Service(DDoS) on the cloud [J].
Vanitha, R. .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2016, 16 (04) :90-96
[40]   Modified aggressive mode of Internet Key Exchange resistant against Denial-of-Service attacks [J].
Matsuura, K ;
Imai, H .
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (05) :972-979