Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes

4Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Even though memory-based denial-of-service attacks can cause severe performance degradations on co-located virtual machines, a previous detection scheme against such attacks cannot accurately detect the attacks and also generates high detection delay and high performance overhead since it assumes that cache-related statistics of an application follow the same probability distribution at all times, which may not be true for all types of applications. In this paper, we present the experimental results showing the impacts of memory DoS attacks on different types of cloud-based applications. Based on these results, we propose two lightweight, responsive Statistical based Detection Schemes (SDS/B and SDS/P) that can detect such attacks accurately. SDS/B constructs a profile of normal range of cache-related statistics for all applications and use statistical methods to infer an attack when the real-time collected statistics exceed this normal range, while SDS/P exploits the increased periods of access patterns for periodic applications to infer an attack. Our evaluation results show that SDS/B and SDS/P outperform the state-of-the-art detection scheme, e.g., with 65% higher specificity, 40% shorter detection delay, and 7% less performance overhead.

Cite

CITATION STYLE

APA

Li, Z., Sen, T., Shen, H., & Chuah, M. C. (2020). Impact of Memory DoS Attacks on Cloud Applications and Real-Time Detection Schemes. In ACM International Conference Proceeding Series. Association for Computing Machinery. https://doi.org/10.1145/3404397.3404465

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free