Adversarial exploits of end-systems adaptation dynamics

被引:9
作者
Guirguis, Mina
Bestavros, Azer
Matta, Ibrahim
Zhang, Yuting
机构
[1] Texas State Univ, Dept Comp Sci, San Marcos, TX 78666 USA
[2] Boston Univ, Dept Comp Sci, Boston, MA 02215 USA
[3] Allegheny Coll, Dept Comp Sci, Meadville, PA 16335 USA
基金
美国国家科学基金会;
关键词
security; denial of service; scalable web services; adaptive resource management; performance evaluation;
D O I
10.1016/j.jpdc.2006.10.005
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Internet end-systems employ various adaptation mechanisms that enable them to respond adequately to legitimate requests in overload situations. Today, these mechanisms are incorporated in most scalable end-systems through the use of one or more component subsystems such as admission controllers, traffic shapers, content transcoders, QoS Controllers, and load balancers. While the design of these components has been heavily investigated and significantly fine-tuned for efficiency and scalability purposes, the security implication of the adaptation mechanisms used in these components has not been on the radar to system designers. To that end, this paper exposes adversarial exploits of the dynamics that result from the adaptive nature of these components. We show that a well orchestrated Reduction of Quality (RoQ) attack could induce significant inefficiencies or reduce the service quality of end-systems, without resorting to brute-force Denial-of-Service (DoS) exploits that target the limited steady-state capacity of these end-systems. We present a general analytical framework that captures the effect of RoQ exploits on the underlying optimization process of the adaptation mechanisms. Using detailed models, we instantiate this general framework for some of the aforementioned end-system adaptation mechanisms, focusing on admission controllers and load balancers. Our exposition is supported with numerical solutions of analytical models, which are validated using results from detailed simulations, and measurements from real Internet experiments performed in our lab. (c) 2006 Elsevier Inc. All rights reserved.
引用
收藏
页码:318 / 335
页数:18
相关论文
共 43 条
[1]   Web content adaptation to improve server overload behavior [J].
Abdelzaher, TF ;
Bhatti, N .
COMPUTER NETWORKS, 1999, 31 (11-16) :1563-1577
[2]  
ABDELZAHER TF, 2000, P 39 IEEE C DEC CONT
[3]  
ANDERSSON M, 2003, P ITCOM
[4]  
[Anonymous], 2003, 2003 C APPL TECHNOLO, P99, DOI 10.1145/863955.863968
[5]  
[Anonymous], P NSDI
[6]  
BALTER MH, 1999, J PARALLEL DISTRIBUT, V59, P204
[7]  
BESTAVROS A, 1997, TR1997015 BOST U COM
[8]  
CARLSTROM J, 2002, P INFOCOM
[9]  
CENTER CC, 2001, TRENDS DENIAL SERVIC
[10]  
CENTER CC, CERT ADVISORY CA 199