Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism

Mor Sides, A. Bremler-Barr, Elisha J. Rosensweig
{"title":"Yo-Yo Attack: Vulnerability In Auto-scaling Mechanism","authors":"Mor Sides, A. Bremler-Barr, Elisha J. Rosensweig","doi":"10.1145/2785956.2790017","DOIUrl":null,"url":null,"abstract":"In the last few years, more and more public and private networks rely on cloud and virtualization to provide the service while meeting their SLA commitments. One attractive property of the cloud is its support for rapid elasticity the ability to scale the number of machines up and down according to the load on the machine, which can be configured to occur automatically, according to customer-set thresholds. This auto-scaling mechanism provides an ability to cope with many of the basic Distributed Denial of Service (DDoS) attacks (as describe in [4]), but opens the door to a new type of attack, the Economic Denial of Sustainability attacks (EDoS) [2]. In DDoS, an attacker overwhelms the victim with bogus traffic, blocking the service from legitimate users. With a cloud-based operation, the auto-scaling mechanism ensures that a victim can cope with an attack by providing the victim with more resources to handle the attack. This solution, however, comes with an economic penalty termed EDoS, since the victim needs to pay for the extra not beneficial resources that process the bogus traffic. In many DoS attacks, the danger of the attack impact is mitigated by the expected cost to the attacker: the more effort required on the side of the attacker, who has to invest in generating large amounts of traffic, the less likely it is to occur. In this work we present the ’Yo-Yo attack’, an efficient attack on the auto-scaling mechanism, which results in an Economic Denial of Sustainability attack (EDoS) that is difficult to detect. The attack cycles between two phases repeatedly: In the on-attack phase, the attacker sends a short burst of traffic that causes the auto-scaling mechanism to perform a scale up. In the off-attack phase, the attacker stops sending the excess traffic. This second phase takes","PeriodicalId":268472,"journal":{"name":"Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication","volume":"271 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/2785956.2790017","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6

Abstract

In the last few years, more and more public and private networks rely on cloud and virtualization to provide the service while meeting their SLA commitments. One attractive property of the cloud is its support for rapid elasticity the ability to scale the number of machines up and down according to the load on the machine, which can be configured to occur automatically, according to customer-set thresholds. This auto-scaling mechanism provides an ability to cope with many of the basic Distributed Denial of Service (DDoS) attacks (as describe in [4]), but opens the door to a new type of attack, the Economic Denial of Sustainability attacks (EDoS) [2]. In DDoS, an attacker overwhelms the victim with bogus traffic, blocking the service from legitimate users. With a cloud-based operation, the auto-scaling mechanism ensures that a victim can cope with an attack by providing the victim with more resources to handle the attack. This solution, however, comes with an economic penalty termed EDoS, since the victim needs to pay for the extra not beneficial resources that process the bogus traffic. In many DoS attacks, the danger of the attack impact is mitigated by the expected cost to the attacker: the more effort required on the side of the attacker, who has to invest in generating large amounts of traffic, the less likely it is to occur. In this work we present the ’Yo-Yo attack’, an efficient attack on the auto-scaling mechanism, which results in an Economic Denial of Sustainability attack (EDoS) that is difficult to detect. The attack cycles between two phases repeatedly: In the on-attack phase, the attacker sends a short burst of traffic that causes the auto-scaling mechanism to perform a scale up. In the off-attack phase, the attacker stops sending the excess traffic. This second phase takes
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
溜溜球攻击:自动缩放机制中的漏洞
在过去的几年里,越来越多的公共和私有网络依靠云和虚拟化来提供服务,同时满足他们的SLA承诺。云的一个吸引人的特性是它对快速弹性的支持,即根据机器上的负载上下扩展机器数量的能力,可以根据客户设置的阈值将其配置为自动发生。这种自动扩展机制提供了应对许多基本的分布式拒绝服务(DDoS)攻击的能力(如[4]所述),但也为一种新型攻击打开了大门,即经济拒绝可持续性攻击(EDoS)[2]。在DDoS攻击中,攻击者用虚假流量淹没受害者,阻止合法用户的服务。在基于云的操作中,自动扩展机制通过为受害者提供更多的资源来应对攻击,从而确保受害者能够应对攻击。然而,这种解决方案带来了一种被称为EDoS的经济惩罚,因为受害者需要为处理虚假流量的额外无用资源付费。在许多DoS攻击中,攻击影响的危险被攻击者的预期成本所减轻:攻击者需要付出的努力越多,攻击者必须投资于生成大量流量,攻击发生的可能性就越小。在这项工作中,我们提出了“溜溜球攻击”,这是一种对自动扩展机制的有效攻击,它导致难以检测的经济拒绝可持续性攻击(EDoS)。两个阶段之间的攻击周期重复:在攻击阶段,攻击者发送短时间的突发流量,导致自动扩展机制执行扩展。在offattack阶段,攻击者停止发送多余的流量。第二阶段需要
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Alternative Trust Sources: Reducing DNSSEC Signature Verification Operations with TLS RPKI MIRO: Monitoring and Inspection of RPKI Objects Hopper: Decentralized Speculation-aware Cluster Scheduling at Scale Extreme Data-rate Scheduling for the Data Center Multi-Context TLS (mcTLS): Enabling Secure In-Network Functionality in TLS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1