skip to main content
short-paper
Free access

Policy Injection: A Cloud Dataplane DoS Attack

Published: 07 August 2018 Publication History
  • Get Citation Alerts
  • Abstract

    Enterprises continue to migrate their services to the cloud on a massive scale, but the increasing attack surface has become a natural target for malevolent actors. We show policy injection, a novel algorithmic complexity attack that enables a tenant to add specially tailored ACLs into the data center fabric to mount a denial-of-service attack through exploiting the built-in security mechanisms of the cloud management systems (CMS). Our insight is that certain ACLs, when fed with special covert packets by an attacker, may be very difficult to evaluate, leading to an exhaustion of cloud resources. We show how a tenant can inject seemingly harmless ACLs into the cloud data plane to abuse an algorithmic deficiency in the most popular cloud hypervisor switch, Open vSwitch, and reduce its effective peak performance by 80--90%, and, in certain cases, denying network access altogether.

    References

    [1]
    CNCF. 2018. Network Policies. https://kubernetes.io/docs/concepts/services-networking/network-policies.
    [2]
    Scott A. Crosby and Dan S. Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks. In USENIX Security. 3--3.
    [3]
    Levente Csikor and Dimitrios P. Pezaros. 2017. End-Host Driven Troubleshooting Architecture for Software-Defined Networking. In IEEE Globecom 2017. 1--7.
    [4]
    A. Feldman and S. Muthukrishnan. 2000. Tradeoffs for packet classification. In INFOCOM, Vol. 3. 1193--1202.
    [5]
    P. Gupta and N. McKeown. 2001. Algorithms for Packet Classification. Netwrk. Mag. of Global Internetwkg. 15, 2 (2001), 24--32.
    [6]
    László Molnár, Gergely Pongrácz, Gábor Enyedi, Zoltán Lajos Kis, Levente Csikor, Ferenc Juhász, Attila Kőrösi, and Gábor Rétvári. 2016. Data-plane Specialization for High-performance OpenFlow Software Switching. In SIGCOMM. 539--552.
    [7]
    Theofilos Petsios, Jason Zhao, Angelos D. Keromytis, and Suman Jana. 2017. SlowFuzz: Automated Domain-Independent Detection of Algorithmic Complexity Vulnerabilities. In ACM CCS. 2155--2168.
    [8]
    Nick Shelly, Ethan J. Jackson, Teemu Koponen, Nick McKeown, and Jarno Rajahalme. 2014. Flow Caching for High Entropy Packet Fields. SIGCOMM Comput. Commun. Rev. 44, 4 (2014).
    [9]
    The OpenStack project. 2018. Manage project security. https://docs.openstack.org/nova/pike/admin/security-groups.html.

    Cited By

    View all
    • (2022)Tenant-Grained Request Scheduling in Software-Defined Cloud ComputingIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2022.319903133:12(4654-4671)Online publication date: 1-Dec-2022
    • (2022)A Robust Service Mapping Scheme for Multi-Tenant CloudsIEEE/ACM Transactions on Networking10.1109/TNET.2021.313329330:3(1146-1161)Online publication date: Jun-2022
    • (2020)MisMesh: Security Issues and Challenges in Service MeshesSecurity and Privacy in Communication Networks10.1007/978-3-030-63086-7_9(140-151)Online publication date: 12-Dec-2020
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    SIGCOMM '18: Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos
    August 2018
    165 pages
    ISBN:9781450359153
    DOI:10.1145/3234200
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 07 August 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Cloud security
    2. DoS
    3. OVS
    4. policy injection

    Qualifiers

    • Short-paper
    • Research
    • Refereed limited

    Funding Sources

    Conference

    SIGCOMM '18
    Sponsor:
    SIGCOMM '18: ACM SIGCOMM 2018 Conference
    August 20 - 25, 2018
    Budapest, Hungary

    Acceptance Rates

    Overall Acceptance Rate 554 of 3,547 submissions, 16%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)44
    • Downloads (Last 6 weeks)4

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)Tenant-Grained Request Scheduling in Software-Defined Cloud ComputingIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2022.319903133:12(4654-4671)Online publication date: 1-Dec-2022
    • (2022)A Robust Service Mapping Scheme for Multi-Tenant CloudsIEEE/ACM Transactions on Networking10.1109/TNET.2021.313329330:3(1146-1161)Online publication date: Jun-2022
    • (2020)MisMesh: Security Issues and Challenges in Service MeshesSecurity and Privacy in Communication Networks10.1007/978-3-030-63086-7_9(140-151)Online publication date: 12-Dec-2020
    • (2019)MTSProceedings of the 2019 USENIX Conference on Usenix Annual Technical Conference10.5555/3358807.3358851(521-536)Online publication date: 10-Jul-2019
    • (2019)NetBOAProceedings of the 2019 Workshop on Network Meets AI & ML10.1145/3341216.3342207(8-14)Online publication date: 14-Aug-2019

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media