We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Kubernetes Autoscaling: YoYo Attack Vulnerability and Mitigation

Abstract: In recent years, we have witnessed a new kind of DDoS attack, the burst attack(Chai, 2013; Dahan, 2018), where the attacker launches periodic bursts of traffic overload on online targets. Recent work presents a new kind of Burst attack, the YoYo attack (Bremler-Barr et al., 2017) that operates against the auto-scaling mechanism of VMs in the cloud. The periodic bursts of traffic loads cause the auto-scaling mechanism to oscillate between scale-up and scale-down phases. The auto-scaling mechanism translates the flat DDoS attacks into Economic Denial of Sustainability attacks (EDoS), where the victim suffers from economic damage accrued by paying for extra resources required to process the traffic generated by the attacker. However, it was shown that YoYo attack also causes significant performance degradation since it takes time to scale-up VMs. In this research, we analyze the resilience of Kubernetes auto-scaling against YoYo attacks. As containerized cloud applications using Kubernetes gain popularity and replace VM-based architecture in recent years. We present experimental results on Google Cloud Platform, showing that even though the scale-up time of containers is much lower than VM, Kubernetes is still vulnerable to the YoYo attack since VMs are still involved. Finally, we evaluate ML models that can accurately detect YoYo attack on a Kubernetes cluster.
Comments: Paper contains 14 pages, 4 figures. This paper was presented in CLOSER 2021 conference on April 28,2021. CLOSER 2021 is the 11th International Conference on Cloud Computing and Services Science, which was organized by INSTICC. The paper is available soon at SCITEPRESS Digital Library
Subjects: Cryptography and Security (cs.CR); Networking and Internet Architecture (cs.NI)
Journal reference: Volume 1: CLOSER 2021,ISBN 978-989-758-510-4, pages 34-44
DOI: 10.5220/0010397900340044
Cite as: arXiv:2105.00542 [cs.CR]
  (or arXiv:2105.00542v2 [cs.CR] for this version)

Submission history

From: Ronen Ben David [view email]
[v1] Sun, 2 May 2021 19:54:35 GMT (440kb,D)
[v2] Sat, 8 May 2021 09:37:32 GMT (440kb,D)

Link back to: arXiv, form interface, contact.