A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model

被引:0
|
作者
Pimpalkar, Neha [1 ]
Abraham, Jibi [1 ]
机构
[1] Coll Engn Pune, Dept Comp Engn & IT, Pune 411005, Maharashtra, India
关键词
Last Level Cache(LLC); side-channel attack; Virtual Machines(VMs); Intrusion Detection and Prevention System; SLA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Businesses have observed a paradigm shift from traditional computing models to "pay as you use" Cloud Computing model. Major Cloud Service Providers(CSPs) like Amazon AWS and Microsoft Azure use virtualization technologies to provide users with Virtual Machines(VM) as they require for the computations. Many VMs unknown to each other are co-located on the same physical machine to maximize resource utilization. However, this poses a serious threat to the security of cloud users. Recent research has shown the evidence of reconstructing secret keys from co-located target VM via creation of side-channels. In this paper, an LLC DoS attack technique named as Continuous Flush is presented which aims to degrade processor performance. A significant increase in CPU cycles and cache misses are observed which results in under-utilization of CPU. This attack can be a threat to the cloud infrastructure. Moreover, such attack may also violate the cloud Service Level Agreement(SLA) present between CSPs and its customers which may further affect the reputation of the CSPs in turn affecting the businesses. A generalized Hypervisor-based Intrusion Detection and Prevention System model is proposed wherein the detection model is focusing on cache attacks in the cloud environment combining several strategies and prevention model will isolate the malicious VM which will be charged significantly higher by CSP.
引用
收藏
页码:419 / 424
页数:6
相关论文
共 50 条
  • [1] An Anomaly Behavior based Detection and Prevention of DoS Attack in IoT Environment
    Kumar, S. Santhosh
    Kulothungan, K.
    [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 287 - 292
  • [2] Study on prevention of DoS attack using honeypot technique
    Zhang, Deng-Yin
    Luo, Tao
    [J]. Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (02): : 40 - 43
  • [3] DoS attack prevention technique in Wireless Sensor Networks
    Patil, Shital
    Chaudhari, Sangita
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 : 715 - 721
  • [4] An LLC-Based Planar Wireless Power Transfer System for Multiple Devices
    Liu, Nan
    Wang, Bingnan
    [J]. 2014 TWENTY-NINTH ANNUAL IEEE APPLIED POWER ELECTRONICS CONFERENCE AND EXPOSITION (APEC), 2014, : 3411 - 3417
  • [5] Authentication Flooding DOS Attack Detection and Prevention in 802.11
    Elhigazi, Abdallah
    Abd Razak, Shukor
    Hamdan, Mosab
    Mohammed, Bushra
    Abaker, Ibrahim
    Elsafi, Abubakar
    [J]. 2020 18TH IEEE STUDENT CONFERENCE ON RESEARCH AND DEVELOPMENT (SCORED), 2020, : 325 - 329
  • [6] An Intelligence Technique for Denial of Service (DoS) Attack Detection
    Manan, Wan Nurulsafawati Wan
    Safiuddin, Tuan Muhammad
    Dzolkhifli, Zarina
    Hassin, Mohd Hafiz Mohd
    [J]. ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7446 - 7450
  • [7] An Anomaly Based VoIP DoS Attack Detection and Prevention Method Using Fuzzy Logic
    Hosseinpour, Mahsa
    Moghaddam, Mohammad Hossein Yaghmaee
    Seno, Seyed Amin Hosseini
    Roshkhari, Hossein Khosravi
    [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 713 - 718
  • [8] Intelligent DoS Attack Detection with Congestion Control Technique for VANETs
    Gopi, R.
    Mathapati, Mahantesh
    Prasad, B.
    Ahmad, Sultan
    Al-Wesabi, Fahd N.
    Alohali, Manal Abdullah
    Hilal, Anwer Mustafa
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 72 (01): : 141 - 156
  • [9] Controlled Channel Attack Detection Based on Hardware Virtualization
    Qiang, Chenyi
    Liu, Weijie
    Wang, Lina
    Yu, Rongwei
    [J]. ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2018, PT I, 2018, 11334 : 406 - 420
  • [10] A Symmetrical Architecture for PV String Using LLC-based Voltage Multiplier by Differential Power Processing Technique
    Wang, Xue
    Wen, Huiqing
    Zhu, Yinxiao
    Chu, Guanying
    Du, Rui
    [J]. 2022 IEEE ENERGY CONVERSION CONGRESS AND EXPOSITION (ECCE), 2022,