Shrew Attack in Cloud Data Center Networks

Mobile Ad-hoc and Sensor Networks(2011)

引用 18|浏览2
暂无评分
摘要
Multi-tenancy and lack of network performance isolation among tenants together make the public cloud vulnerable to attacks. This paper studies one of the potential attacks, namely, low-rate denial-of-service (DoS) attack (or textit{Shrew} attack for short), in cloud data center networks (DCNs). To explore the feasibility of launching Shrew attack from the perspective of a normal external tenant, we first leverage a loss-based probe to identify the locations and capabilities of the underlying bottlenecks, and then make use of the low-latency feature of DCNs to synchronize the participating attack flows. Moreover, we quantitatively analyze the necessary and sufficient traffic for an effective attack. Using a combination of analytical modeling and extensive experiments, we demonstrate that a tenant could initiate an efficient Shrew attack with extremely little traffic, e.g., milliseconds-long burst traffic, which imposes significant difficulty for the switching boxes and counter-DoS mechanisms to detect. We identify that both the conventional protocol assumption and new features of DCNs enable such Shrew attack, and new techniques are required to thwart it in the DCNs.
更多
查看译文
关键词
normal external tenant,cloud data center network,sufficient traffic,attack flow,efficient shrew attack,multitenancy,tcp,effective attack,shrew attack,computer network security,network performance isolation,denial of service,low-rate denial-of-service attack,milliseconds-long burst traffic,data center network,new technique,cloud data center networks,cloud computing,new feature,potential attack,counter-dos mechanisms,data center,dos attack,network performance,low latency
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要