Introducing Fraudulent Energy Consumption in Cloud Infrastructures: A New Generation of Denial-of-Service Attacks

被引:22
作者
Ficco, Massimo [1 ]
Palmieri, Francesco [1 ]
机构
[1] Univ Naples 2, Dept Ind & Informat Engn, I-81031 Aversa, Italy
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Cloud infrastructures; denial of service; fraudulent energy consumption; intrusion prevention; low-rate attacks; RATE DOS ATTACK; SECURITY; DEFENSE;
D O I
10.1109/JSYST.2015.2414822
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, cloud computing is the target business environment for many enterprises and government organizations. However, despite the huge potential gains that can be achieved, security represents a fundamental issue, which prevents the massive cloud adoption inmission-critical Information Technology sectors. The most common security issues are amplified in the cloud environment since new complex features, with their inherent weaknesses, enter into the problem space, particularly those associated to multitenancy and elasticity. Thus, new threats, such as the energy-related denial-of-service attacks against large-scale cloud infrastructures, may involve not only the quality of the delivered services but also their operational costs in terms of energy bill. The longer is the time necessary to identify such attacks, the heavier is the impact on the overall energy consumption and, consequently, on the associated expenses. This work presents a detailed analysis of such new sophisticated menaces, by focusing on those that are specifically tailored to originate the worst-case energy demands by leveraging properly crafted low-rate traffic patterns in order to ensure stealth operations. We present some strategies exploiting the cloud flexibility in order to increase in a fraudulent way the overall energy consumption and analyze their impact within large-scale cloud infrastructures. This should help cloud providers in understanding such weaknesses and highlighting their root causes, as well as in providing some hints on how they can counter these subtle security issues.
引用
收藏
页码:460 / 470
页数:11
相关论文
共 50 条
[41]   Robust Resilient Control for Nonlinear Systems Under Denial-of-Service Attacks [J].
Li, Zhiqiang ;
Li, Qing ;
Ding, Da-Wei ;
Sun, Xinmiao .
IEEE TRANSACTIONS ON FUZZY SYSTEMS, 2021, 29 (11) :3415-3427
[42]   A Queuing Analysis of Tolerating for Denial-of-Service (DoS) Attacks with a Proxy Network [J].
Aye, Myint Myint .
2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY, VOL II, PROCEEDINGS, 2009, :366-368
[43]   Impacts of Denial-of-Service Attack on Energy Efficiency Pulse Coupled Oscillator [J].
Hassan, Faisal Osman ;
Samir, Nasrina M. ;
Hanapi, Zurina Mohd .
BAGHDAD SCIENCE JOURNAL, 2023, 20 (05) :1817-1824
[44]   Detection and Mitigation of Low-Rate Denial-of-Service Attacks: A Survey [J].
Rios, Vinicius De Miranda ;
Inacio, Pedro R. M. ;
Magoni, Damien ;
Freire, Mario M. .
IEEE ACCESS, 2022, 10 :76648-76668
[45]   Lightweight Detection of Denial-of-Service Attacks on Wireless Sensor Networks Revisited [J].
Almon, Lars ;
Riecker, Michael ;
Hollick, Matthias .
2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), 2017, :444-452
[46]   Denial-of-Service Attacks and Countermeasures in the RPL-Based Internet of Things [J].
Ioulianou, Philokypros P. ;
Vassilakis, Vassilios G. .
COMPUTER SECURITY, ESORICS 2019, 2020, 11980 :374-390
[47]   On the Need of Neuromorphic Twins to Detect Denial-of-Service Attacks on Communication Networks [J].
Boche, Holger ;
Schaefer, Rafael F. ;
Poor, H. Vincent ;
Fitzek, Frank H. P. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (04) :2875-2887
[48]   Denial-of-Service (DoS) Attacks on Load Frequency Control in Smart Grids [J].
Liu, Shichao ;
Liu, Xiaoping P. ;
El Saddik, Abdulmotaleb .
2013 IEEE PES INNOVATIVE SMART GRID TECHNOLOGIES (ISGT), 2013,
[49]   Defence for Distributed Denial of Service Attacks in Cloud Computing [J].
Carlin, Andrew ;
Hammoudeh, Mohammad ;
Aldabbas, Omar .
INTERNATIONAL CONFERENCE ON ADVANCED WIRELESS INFORMATION AND COMMUNICATION TECHNOLOGIES (AWICT 2015), 2015, 73 :490-497
[50]   CNN-Based Network Intrusion Detection against Denial-of-Service Attacks [J].
Kim, Jiyeon ;
Kim, Jiwon ;
Kim, Hyunjung ;
Shim, Minsun ;
Choi, Eunjung .
ELECTRONICS, 2020, 9 (06) :1-21