Skip to main content
Erschienen in: The Journal of Supercomputing 5/2015

01.05.2015

Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures

verfasst von: Francesco Palmieri, Sergio Ricciardi, Ugo Fiore, Massimo Ficco, Aniello Castiglione

Erschienen in: The Journal of Supercomputing | Ausgabe 5/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This work analyzes a new and very subtle kind of security threat that can affect large-scale cloud-based IT service infrastructures, by exploiting the computational resources of their component data center to waste as much energy as possible. The consequence of these threats ranges from increased costs in the energy bill, to penalization for exceeding the agreed quantity of greenhouse gases (GHG) emissions, up to complete denial of service caused by electrical outages due to power budget exhaustion. We analyzed different types of such attacks with their potential impacts on the energy consumption, modeled their behavior and quantified how current energy-proportional technologies may provide attackers with great opportunities for raising the target facility emissions and costs. These efforts resulted in a simple model with some parametric reference values that can be used to estimate the impact of such attacks also in presence of very large infrastructures containing thousands or millions of servers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
3.
Zurück zum Zitat Heller B, Seetharaman S, Mahadevan P, Yiakoumis Y, Sharma P, Banerjee S, McKeown N (2010) Elastictree: saving energy in data center networks. In: Proceedings of the 7th USENIX symposium on networked system design and implementation (NSDI), ACM, pp 249–264 Heller B, Seetharaman S, Mahadevan P, Yiakoumis Y, Sharma P, Banerjee S, McKeown N (2010) Elastictree: saving energy in data center networks. In: Proceedings of the 7th USENIX symposium on networked system design and implementation (NSDI), ACM, pp 249–264
4.
Zurück zum Zitat Barroso LA, Holzle U (2007) The case for energy-proportional computing. Computer 40(12):33–37CrossRef Barroso LA, Holzle U (2007) The case for energy-proportional computing. Computer 40(12):33–37CrossRef
5.
Zurück zum Zitat Bash C, Forman G (2007) Cool job allocation: measuring the power savings of placing jobs at cooling-efficient locations in the data center. In: Proceedings of USENIX annual technical conference, vol 138, p 140 Bash C, Forman G (2007) Cool job allocation: measuring the power savings of placing jobs at cooling-efficient locations in the data center. In: Proceedings of USENIX annual technical conference, vol 138, p 140
6.
Zurück zum Zitat Bickford J, Lagar-Cavilla HA, Varshavsky A, Ganapathy V, Iftode L (2011) Security versus energy tradeoffs in host-based mobile malware detection. In: Proceedings of the 9th international conference on mobile systems, applications, and services, ACM, pp 225–238 Bickford J, Lagar-Cavilla HA, Varshavsky A, Ganapathy V, Iftode L (2011) Security versus energy tradeoffs in host-based mobile malware detection. In: Proceedings of the 9th international conference on mobile systems, applications, and services, ACM, pp 225–238
7.
Zurück zum Zitat Bjorling M, Bonnet P, Bouganim L, Jónsson BP et al (2010) uFLIP: understanding the energy consumption of flash devices. IEEE Data Eng Bull 33(4):48–54 Bjorling M, Bonnet P, Bouganim L, Jónsson BP et al (2010) uFLIP: understanding the energy consumption of flash devices. IEEE Data Eng Bull 33(4):48–54
8.
Zurück zum Zitat Bohrer P, Elnozahy EN, Keller T, Kistler M, Lefurgy C, McDowell C, Rajamony R (2002) The case for power management in web servers. In: Proceedings of power aware computing, Springer, USA, pp 261–289 Bohrer P, Elnozahy EN, Keller T, Kistler M, Lefurgy C, McDowell C, Rajamony R (2002) The case for power management in web servers. In: Proceedings of power aware computing, Springer, USA, pp 261–289
9.
Zurück zum Zitat BONE project (2009) WP 21 topical project green optical networks: report on year 1 and updated plan for activities, NoE, FP7-ICT-2007-1 216863 BONE project, Dec 2009 BONE project (2009) WP 21 topical project green optical networks: report on year 1 and updated plan for activities, NoE, FP7-ICT-2007-1 216863 BONE project, Dec 2009
12.
Zurück zum Zitat Christensen K, Reviriego P, Nordman B, Bennett M, Mostowfi M, Maestro JA (2010) IEEE 802.3az: the road to energy efficient ethernet. Proc Commun Mag IEEE 48(11):50–56CrossRef Christensen K, Reviriego P, Nordman B, Bennett M, Mostowfi M, Maestro JA (2010) IEEE 802.3az: the road to energy efficient ethernet. Proc Commun Mag IEEE 48(11):50–56CrossRef
13.
Zurück zum Zitat Crosby SA, Wallach DS (2003) Denial of service via algorithmic complexity attacks. In: Proceedings of the 12th USENIX security symposium, USENIX, Washington, pp 29–44 Crosby SA, Wallach DS (2003) Denial of service via algorithmic complexity attacks. In: Proceedings of the 12th USENIX security symposium, USENIX, Washington, pp 29–44
14.
Zurück zum Zitat Dean D, Stubblefield A (2001) Using client puzzles to protect TLS. In: Proceedings of 10th USENIX security symposium, vol 42 Dean D, Stubblefield A (2001) Using client puzzles to protect TLS. In: Proceedings of 10th USENIX security symposium, vol 42
16.
Zurück zum Zitat Fan X, Weber WD, Barroso LA (2007) Power provisioning for a warehouse-sized computer. ACM SIGARCH Comput Archit News 35(2):13–23CrossRef Fan X, Weber WD, Barroso LA (2007) Power provisioning for a warehouse-sized computer. ACM SIGARCH Comput Archit News 35(2):13–23CrossRef
17.
Zurück zum Zitat Ficco M, Rak M (2011) Intrusion tolerant approach for denial of service attacks to web services. In: Data compression, communications and processing (CCP), 2011 first international conference on IEEE, pp 285–292 Ficco M, Rak M (2011) Intrusion tolerant approach for denial of service attacks to web services. In: Data compression, communications and processing (CCP), 2011 first international conference on IEEE, pp 285–292
18.
Zurück zum Zitat Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13–23 Fiore U, Palmieri F, Castiglione A, De Santis A (2013) Network anomaly detection with the restricted Boltzmann machine. Neurocomputing 122:13–23
23.
Zurück zum Zitat Janzen J (2001) Calculating memory system power for DDR SDRAM. Micron Designline, 10(2): 1–12, 2Q,2001 Janzen J (2001) Calculating memory system power for DDR SDRAM. Micron Designline, 10(2): 1–12, 2Q,2001
24.
Zurück zum Zitat Jensen M, Gruschka N, Herkenhner R (2009) A survey of attacks on web services. Comput Sci Res Dev 24(4):185–197CrossRef Jensen M, Gruschka N, Herkenhner R (2009) A survey of attacks on web services. Comput Sci Res Dev 24(4):185–197CrossRef
25.
Zurück zum Zitat Jensen M, Gruschka N, Herkenhoner R, Luttenberger N (2007) SOA and web services: new technologies, new standards, new attacks. In: Proceedings of fifth European conference on web services, ECOWS ’07, pp 35–44. doi:10.1109/ECOWS.2007.9 Jensen M, Gruschka N, Herkenhoner R, Luttenberger N (2007) SOA and web services: new technologies, new standards, new attacks. In: Proceedings of fifth European conference on web services, ECOWS ’07, pp 35–44. doi:10.​1109/​ECOWS.​2007.​9
28.
Zurück zum Zitat Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2009) Above the clouds: a Berkeley view of cloud computing, technical report no UCB/EECS-2009-28, University of California at Berkley, USA, 10 Feb 2009 Armbrust M, Fox A, Griffith R, Joseph A, Katz R, Konwinski A, Lee G, Patterson D, Rabkin A, Stoica I, Zaharia M (2009) Above the clouds: a Berkeley view of cloud computing, technical report no UCB/EECS-2009-28, University of California at Berkley, USA, 10 Feb 2009
30.
Zurück zum Zitat McDowell M (2004) Understanding denial-of-service attacks. National Cyber Alert System, Cyber Security Tip ST04-015.2004 McDowell M (2004) Understanding denial-of-service attacks. National Cyber Alert System, Cyber Security Tip ST04-015.2004
31.
Zurück zum Zitat Meisner D, Gold BT, Wenisch TF (2009) PowerNap: eliminating server idle power. In: Proceedings of ACM Sigplan notices, vol 44/3, pp 205–216 Meisner D, Gold BT, Wenisch TF (2009) PowerNap: eliminating server idle power. In: Proceedings of ACM Sigplan notices, vol 44/3, pp 205–216
33.
Zurück zum Zitat Mohan V, Bunker T, Grupp L, Gurumurthi S, Stan MR, Swanson S (2013) Modeling power consumption of nand flash memories using flashpower. IEEE Trans Comput Aided Des Integr Circuits Syst 32(7):1031CrossRef Mohan V, Bunker T, Grupp L, Gurumurthi S, Stan MR, Swanson S (2013) Modeling power consumption of nand flash memories using flashpower. IEEE Trans Comput Aided Des Integr Circuits Syst 32(7):1031CrossRef
34.
Zurück zum Zitat Molaro D, Payer H, Le Moal D (2009) Tempo: disk drive power consumption characterization and modeling. In: Proceedings of 13th international symposium on consumer electronics ISCE ’09, IEEE, pp 246–250 Molaro D, Payer H, Le Moal D (2009) Tempo: disk drive power consumption characterization and modeling. In: Proceedings of 13th international symposium on consumer electronics ISCE ’09, IEEE, pp 246–250
35.
Zurück zum Zitat Padmanabhuni S, Singh V, Senthil Kumar K, Chatterjee A (2006) Preventing service oriented denial of service (PreSODoS): a proposed approach. In: Proceedings of international conference on web services, ICWS ’06, pp 577–584. doi:10.1109/ICWS.2006.102 Padmanabhuni S, Singh V, Senthil Kumar K, Chatterjee A (2006) Preventing service oriented denial of service (PreSODoS): a proposed approach. In: Proceedings of international conference on web services, ICWS ’06, pp 577–584. doi:10.​1109/​ICWS.​2006.​102
36.
Zurück zum Zitat Palmieri F, Fiore U, Castiglione A (2013) A distributed approach to network anomaly detection based on independent component analysis. Concurr Comput Pract Exp 26(5):1113–1129 Palmieri F, Fiore U, Castiglione A (2013) A distributed approach to network anomaly detection based on independent component analysis. Concurr Comput Pract Exp 26(5):1113–1129
38.
Zurück zum Zitat Palmieri F, Ricciardi S, Fiore U (2011) Evaluating network-based DoS attacks under the energy consumption perspective: new security issues in the coming green ICT area. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), IEEE, pp 374–379 Palmieri F, Ricciardi S, Fiore U (2011) Evaluating network-based DoS attacks under the energy consumption perspective: new security issues in the coming green ICT area. In: Proceedings of 2011 international conference on broadband and wireless computing, communication and applications (BWCCA), IEEE, pp 374–379
39.
Zurück zum Zitat Park J, Yoo S, Lee S, Park C (2009) Power modeling of solid state disk for dynamic power management policy design in embedded systems. In: Software technologies for embedded and ubiquitous systems, Springer, Berlin Heidelberg, pp 24–35 Park J, Yoo S, Lee S, Park C (2009) Power modeling of solid state disk for dynamic power management policy design in embedded systems. In: Software technologies for embedded and ubiquitous systems, Springer, Berlin Heidelberg, pp 24–35
40.
Zurück zum Zitat Kogge P (2011) The tops in flops. IEEE Spectrum 48(2):49–54 Kogge P (2011) The tops in flops. IEEE Spectrum 48(2):49–54
41.
Zurück zum Zitat Reviriego P, Hernández J, Larrabeiti D, Maestro JA (2009) Performance evaluation of energy efficient Ethernet. Commun Lett IEEE 13(9):697–699CrossRef Reviriego P, Hernández J, Larrabeiti D, Maestro JA (2009) Performance evaluation of energy efficient Ethernet. Commun Lett IEEE 13(9):697–699CrossRef
42.
Zurück zum Zitat Ricciardi S, Careglio D, Fiore U, Palmieri F, Santos-Boada G, Solé-Pareta J (2011) Analyzing local strategies for energy-efficient networking. In: Lecture notes in computer science, vol 6827, Springer,Berlin Heidelberg, pp 291–300 Ricciardi S, Careglio D, Fiore U, Palmieri F, Santos-Boada G, Solé-Pareta J (2011) Analyzing local strategies for energy-efficient networking. In: Lecture notes in computer science, vol 6827, Springer,Berlin Heidelberg, pp 291–300
44.
Zurück zum Zitat Sohan R, Rice A, Moore AW, Mansley K (2010) Characterizing 10 Gbps network interface energy consumption. In: Proceedings of 35th Conference on local computer networks (LCN), 2010 IEEE, pp 268–271 Sohan R, Rice A, Moore AW, Mansley K (2010) Characterizing 10 Gbps network interface energy consumption. In: Proceedings of 35th Conference on local computer networks (LCN), 2010 IEEE, pp 268–271
48.
Zurück zum Zitat Vereecken W, Van Heddeghem W, Colle D, Pickavet M, Demeester P (2010) Overall ICT footprint and green communication technologies. In: Proceedings of ISCCSP 2010, Limassol, Cyprus, Mar 2010 Vereecken W, Van Heddeghem W, Colle D, Pickavet M, Demeester P (2010) Overall ICT footprint and green communication technologies. In: Proceedings of ISCCSP 2010, Limassol, Cyprus, Mar 2010
49.
Zurück zum Zitat West W, Agu E (2007) Experimental evaluation of energy-based denial-of service attacks in wireless networks. IJCSNS 7(6):222 West W, Agu E (2007) Experimental evaluation of energy-based denial-of service attacks in wireless networks. IJCSNS 7(6):222
50.
Zurück zum Zitat Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRef Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Internet Serv Appl 1(1):7–18CrossRef
Metadaten
Titel
Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures
verfasst von
Francesco Palmieri
Sergio Ricciardi
Ugo Fiore
Massimo Ficco
Aniello Castiglione
Publikationsdatum
01.05.2015
Verlag
Springer US
Erschienen in
The Journal of Supercomputing / Ausgabe 5/2015
Print ISSN: 0920-8542
Elektronische ISSN: 1573-0484
DOI
https://doi.org/10.1007/s11227-014-1242-6

Weitere Artikel der Ausgabe 5/2015

The Journal of Supercomputing 5/2015 Zur Ausgabe