TY - JOUR
T1 - Catch Me if You Can
T2 - A Closer Look at Malicious Co-Residency on the Cloud
AU - Atya, Ahmed Osama Fathy
AU - Qian, Zhiyun
AU - Krishnamurthy, Srikanth V.
AU - La Porta, Thomas
AU - McDaniel, Patrick
AU - Marvel, Lisa M.
N1 - Funding Information:
Manuscript received April 16, 2017; revised December 12, 2017, March 20, 2018 and September 3, 2018; accepted December 23, 2018; approved by IEEE/ACM TRANSACTIONS ON NETWORKING Editor Y. Zhang. Date of publication February 21, 2019; date of current version April 16, 2019. This work was supported in part by the U.S. Army Research Laboratory Cyber Security Collaborative Research Alliance under Cooperative Agreement W911NF-13-2-0045. (Corresponding author: Ahmed Osama Fathy Atya.) A. O. F. Atya, Z. Qian, and S. V. Krishnamurthy are with the University of California at Riverside, Riverside, CA 92521 USA (e-mail: a.osama.ce@gmail.com).
Publisher Copyright:
© 1993-2012 IEEE.
PY - 2019/4
Y1 - 2019/4
N2 - VM migration is an effective countermeasure against attempts at malicious co-residency. In this paper, our overarching objectives are: (a) to get an in-depth understanding of the ways and effectiveness with which an attacker can launch attacks toward achieving co-residency and (b) to design migration policies that are very effective in thwarting malicious co-residency, but are thrifty in terms of the bandwidth and downtime costs that are incurred with live migration. Toward achieving our goals, we first undertake an experimental study on Amazon EC2 to obtain an in-depth understanding of the side-channels, through which an attacker can use to ascertain co-residency with a victim. Here, in this paper, we identify a new set of stealthy side-channel attacks which we show to be more effective than the currently available attacks toward verifying co-residency. We also build a simple model that can be used for estimating co-residency times based on very few measurements on a given cloud platform, to account for varying attacker capabilities. Based on the study, we develop a set of guidelines to determine under what conditions the victim VM migrations should be triggered, given the performance costs in terms of bandwidth and downtime, which a user is willing to bear. Through extensive experiments on our private in-house cloud, we show that the migrations, using our guidelines, can limit the fraction of the time that an attacker VM co-resides with a victim VM to about 1% of the time with the bandwidth costs of a few MB and downtimes of a few seconds per day per VM migrated.
AB - VM migration is an effective countermeasure against attempts at malicious co-residency. In this paper, our overarching objectives are: (a) to get an in-depth understanding of the ways and effectiveness with which an attacker can launch attacks toward achieving co-residency and (b) to design migration policies that are very effective in thwarting malicious co-residency, but are thrifty in terms of the bandwidth and downtime costs that are incurred with live migration. Toward achieving our goals, we first undertake an experimental study on Amazon EC2 to obtain an in-depth understanding of the side-channels, through which an attacker can use to ascertain co-residency with a victim. Here, in this paper, we identify a new set of stealthy side-channel attacks which we show to be more effective than the currently available attacks toward verifying co-residency. We also build a simple model that can be used for estimating co-residency times based on very few measurements on a given cloud platform, to account for varying attacker capabilities. Based on the study, we develop a set of guidelines to determine under what conditions the victim VM migrations should be triggered, given the performance costs in terms of bandwidth and downtime, which a user is willing to bear. Through extensive experiments on our private in-house cloud, we show that the migrations, using our guidelines, can limit the fraction of the time that an attacker VM co-resides with a victim VM to about 1% of the time with the bandwidth costs of a few MB and downtimes of a few seconds per day per VM migrated.
UR - http://www.scopus.com/inward/record.url?scp=85061969399&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85061969399&partnerID=8YFLogxK
U2 - 10.1109/TNET.2019.2891528
DO - 10.1109/TNET.2019.2891528
M3 - Article
AN - SCOPUS:85061969399
SN - 1063-6692
VL - 27
SP - 560
EP - 576
JO - IEEE/ACM Transactions on Networking
JF - IEEE/ACM Transactions on Networking
IS - 2
M1 - 8648158
ER -