A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model

被引:0
|
作者
Pimpalkar, Neha [1 ]
Abraham, Jibi [1 ]
机构
[1] Coll Engn Pune, Dept Comp Engn & IT, Pune 411005, Maharashtra, India
关键词
Last Level Cache(LLC); side-channel attack; Virtual Machines(VMs); Intrusion Detection and Prevention System; SLA;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Businesses have observed a paradigm shift from traditional computing models to "pay as you use" Cloud Computing model. Major Cloud Service Providers(CSPs) like Amazon AWS and Microsoft Azure use virtualization technologies to provide users with Virtual Machines(VM) as they require for the computations. Many VMs unknown to each other are co-located on the same physical machine to maximize resource utilization. However, this poses a serious threat to the security of cloud users. Recent research has shown the evidence of reconstructing secret keys from co-located target VM via creation of side-channels. In this paper, an LLC DoS attack technique named as Continuous Flush is presented which aims to degrade processor performance. A significant increase in CPU cycles and cache misses are observed which results in under-utilization of CPU. This attack can be a threat to the cloud infrastructure. Moreover, such attack may also violate the cloud Service Level Agreement(SLA) present between CSPs and its customers which may further affect the reputation of the CSPs in turn affecting the businesses. A generalized Hypervisor-based Intrusion Detection and Prevention System model is proposed wherein the detection model is focusing on cache attacks in the cloud environment combining several strategies and prevention model will isolate the malicious VM which will be charged significantly higher by CSP.
引用
收藏
页码:419 / 424
页数:6
相关论文
共 50 条
  • [21] Model-Free Bidirectional Synchronous Rectification Control Scheme for LLC-Based Energy Storage System in Electric-Vehicle Energy Router
    Sun, Chenghao
    Wang, Rui
    Xiao, Xiang
    Wang, Yihe
    Sun, Qiuye
    [J]. IEEE TRANSACTIONS ON TRANSPORTATION ELECTRIFICATION, 2023, 9 (04) : 5140 - 5150
  • [22] Intelligent model for cyber attack detection and prevention
    Hentea, M
    [J]. PROCEEDINGS OF THE ISCA 12TH INTERNATIONAL CONFERENCE INTELLIGENT AND ADAPTIVE SYSTEMS AND SOFTWARE ENGINEERING, 2003, : 5 - 10
  • [23] Attack Detection and Prevention in the Cyber Physical System
    Nutjahan
    Nizam, Farhana
    Chaki, Shudarshon
    Al Mamun, Shamim
    Kaiser, M. Shamim
    [J]. 2016 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2016,
  • [24] A Runtime DDoS Attack Detection Technique Based on Stochastic Mathematical Model
    Farias, Euclides Peres, Jr.
    Jacinto Tavares, Allainn Christiam
    Nogueira, Michele
    [J]. 2023 IEEE LATIN-AMERICAN CONFERENCE ON COMMUNICATIONS, LATINCOM, 2023,
  • [25] Cluster-based Technique for Detection and Prevention of Black-Hole Attack in MANETS
    Saurabh, Vidya Kumari
    Sharma, Roopesh
    Itare, Ravikant
    [J]. 2017 INTERNATIONAL CONFERENCE OF ELECTRONICS, COMMUNICATION AND AEROSPACE TECHNOLOGY (ICECA), VOL 2, 2017, : 489 - 494
  • [26] An new Intrusion Prevention Attack System Model based on Immune Principle
    Guan Xin
    Li Yun-jie
    [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 666 - 669
  • [27] Towards DoS Attack Prevention based on Clustering Architecture in Mobile IP Communication
    Parvin, Sazia
    Ali, Sohrab
    Singh, Jaipal
    Hussain, Farookh
    Han, Song
    [J]. IECON: 2009 35TH ANNUAL CONFERENCE OF IEEE INDUSTRIAL ELECTRONICS, VOLS 1-6, 2009, : 3007 - +
  • [28] A data-mining based DoS detection technique
    Gao, Neng
    Feng, Deng-Guo
    Xiang, Ji
    [J]. Jisuanji Xuebao/Chinese Journal of Computers, 2006, 29 (06): : 944 - 951
  • [29] Hybrid Genetic-FSM Technique for Detection of High-Volume DoS Attack
    Nafie, Mohamed Samy
    Abounaser, Hassan
    Adel, Khaled
    Badr, Amr
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (04) : 500 - 509
  • [30] Novel DoS Attack Detection Based on Trust Mode Authentication for IoT
    Yuvaraj, D.
    Priya, S. Shanmuga
    Braveen, M.
    Krishnan, S. Navaneetha
    Nachiyappan, S.
    Mehbodniya, Abolfazl
    Ahamed, A. Mohamed Uvaze
    Sivaram, M.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1505 - 1522