Cloud computing security



Similar documents
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE

Hey, You, Get Off of My Cloud! Exploring Information Leakage in Third-Party Clouds. Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds

Cloud security CS642: Computer Security Professor Ristenpart h9p:// rist at cs dot wisc dot edu University of Wisconsin CS 642

The Threat of Coexisting With an Unknown Tenant in a Public Cloud

Computer Science. About PaaS Security. Donghoon Kim Henry E. Schaffer Mladen A. Vouk

Network performance in virtual infrastructures

Are Cache Attacks on Public Clouds Practical?

Technology and Cost Considerations for Cloud Deployment: Amazon Elastic Compute Cloud (EC2) Case Study

CSE543 Computer and Network Security Module: Cloud Computing

Chapter 11 Cloud Application Development

Virtual Switching Without a Hypervisor for a More Secure Cloud

Cloud Computing. Adam Barker

On the Prevention of Cache-Based Side-Channel Attacks in a Cloud Environment

Secure Cloud Computing with a Virtualized Network Infrastructure

Stephen Coty Director, Threat Research

Building a Private Cloud Cloud Infrastructure Using Opensource

Security and Privacy in Cloud Computing

Full and Para Virtualization

GreenSQL AWS Deployment

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security Toolsets for ISP Defense

Smartronix Inc. Cloud Assured Services Commercial Price List

WINDOWS AZURE NETWORKING

Small is Better: Avoiding Latency Traps in Virtualized DataCenters

Virtualization and Cloud Computing. The Threat of Covert Channels. Related Work. Zhenyu Wu, Zhang Xu, and Haining Wang 1

IBM Tivoli Composite Application Manager for Microsoft Applications: Microsoft Hyper-V Server Agent Version Fix Pack 2.

Privacy, Security and Cloud

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

Intel s Virtualization Extensions (VT-x) So you want to build a hypervisor?

EECS 489 Winter 2010 Midterm Exam

A Generic Auto-Provisioning Framework for Cloud Databases

Cloud Computing and E-Commerce

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Amazon Elastic Compute Cloud Getting Started Guide. My experience

Amazon EC2 XenApp Scalability Analysis

What is Cloud Computing? Why call it Cloud Computing?

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

HUAWEI OceanStor Load Balancing Technical White Paper. Issue 01. Date HUAWEI TECHNOLOGIES CO., LTD.

Frequent Denial of Service Attacks

Security of IPv6 and DNSSEC for penetration testers

Virtualization & Cloud Computing (2W-VnCC)

Every Silver Lining Has a Vault in the Cloud

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support.

Performance tuning Xen

How To Create A Virtual Private Cloud On Amazon.Com

Networks and Security Lab. Network Forensics

Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.

Xen Live Migration. Networks and Distributed Systems Seminar, 24 April Matúš Harvan Xen Live Migration 1

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

FIREWALL AND NAT Lecture 7a

Network reconnaissance and IDS

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

StACC: St Andrews Cloud Computing Co laboratory. A Performance Comparison of Clouds. Amazon EC2 and Ubuntu Enterprise Cloud

Dynamic Resource allocation in Cloud

How to Grow and Transform your Security Program into the Cloud

Distributed System Monitoring and Failure Diagnosis using Cooperative Virtual Backdoors

Xen and the Art of Virtualization

Network Performance Between Geo-Isolated Data Centers. Testing Trans-Atlantic and Intra-European Network Performance between Cloud Service Providers

Content Delivery Network. Version 0.95

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Information Security. Training

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Web Hosting 101. with Patrick McNeil

How To Stop A Malicious Process From Running On A Hypervisor

Availability Digest. Redundant Load Balancing for High Availability July 2013

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Denial Of Service. Types of attacks

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

Improving the Security of Commodity Hypervisors for Cloud Computing

Firewall Firewall August, 2003

SPACK FIREWALL RESTRICTION WITH SECURITY IN CLOUD OVER THE VIRTUAL ENVIRONMENT

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

Virtualization Technologies and Blackboard: The Future of Blackboard Software on Multi-Core Technologies

UBUNTU DISK IO BENCHMARK TEST RESULTS

CompTIA Network+ (Exam N10-005)

This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.

CIT 668: System Architecture

Enabling Technologies for Distributed and Cloud Computing

LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON

OTM in the Cloud. Ryan Haney

Private Distributed Cloud Deployment in a Limited Networking Environment

Virtualization System Vulnerability Discovery Framework. Speaker: Qinghao Tang Title:360 Marvel Team Leader

Transcription:

Cloud computing security Exploring information leakage in third-party compute clouds Yangchun Fu November 18 th, 2011

Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm attack 5 Conclusions

Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm attack 5 Conclusions

Third-party cloud computing On-demand computing outsouring, share third-party infrastructure Amanzon s EC2 Microsoft s Azure Rackspace s Mosso

risk from cloud provider new trust realtionship customers must trust their cloud provider to respect the privacy of their data and the integrity of their computations.

threat from VM placement Threat multiplex the virtual machines of different customer upon the same physical hardware.

threat from VM placement Threat multiplex the virtual machines of different customer upon the same physical hardware. The adversary may be able to place the malicious instance on the same physical machine where the victim instance reside through legal process. Then lunch certain cross-vm attacks

steps Two steps Placement: adversary arranging to place their malicious VM on the same physical machine as that of a target customer

steps Two steps Placement: adversary arranging to place their malicious VM on the same physical machine as that of a target customer extraction: extract confidential information via a cross-vm attack.

Terminology terminology Instance: a running os image co-resident: instances that are running on the same physical machine

Research questions Qeuestions where an instance is located? how to determine if two instances are co-resident how to launch instance that will be co-resident with other user s instance how to exploit cross-vm information leakage once co-resident.

Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm attack 5 Conclusions

Amazon EC2 service Virtual machine monitor:xen run linux, freebsd, opensolaris and Windows as guest A privileged virtual machine call Dom0 is configured to route packets for guest images and report itself as a hop in trceroutes Credit:[Figure from Thomas s pape, CCS 2009]

more about Amazon EC2 service configuration parameter contain 3 availability zones" with separate power and network connectivity 5 instance type:m1.small, c1.medium, m1.large, m1.xlarge, c1.xlarge.

more about Amazon EC2 service Instance information external ipv4 address and domain name, internal address and domain name. within the cloud, both domain names resolved to internal IP address.

Goal Goal understand where potential target are located in the cloud and the instance creation parameters need to attempt establishing co-residence of an adversarial instance.

Cloud Cartography Hypothesis different availability zones likely to correspond to different internal IP address ranges and may be true for instance types as well. Thus mapping the use of the EC2 internal address allows an adversary to determine which IP address correspond to which creation parameters.

Empirical measurement study Two Data sets launching a number of EC2 instance of varying types and surveying the resulting IP address assigned. enumerating public EC2-based web servers and translate public IP to internal IP

Instance placement parameters Experiment 1 iteratively launching 20 instances for each of the 15 availability zone/instance type pairs.

Instance placement parameters Experiment 1 iteratively launching 20 instances for each of the 15 availability zone/instance type pairs. Credit:[Figure from Thomas s pape, CCS 2009]

Instance placement parameters Experiment 1 iteratively launching 20 instances for each of the 15 availability zone/instance type pairs. Credit:[Figure from Thomas s pape, CCS 2009] different availability zones use different IP regions.

Instance placement parameters Experiment 2 launching 100 instances(20 of each type) in zone 3 for two account A and B.

Instance placement parameters Experiment 2 launching 100 instances(20 of each type) in zone 3 for two account A and B. Credit:[Figure from Thomas s pape, CCS 2009]

Instance placement parameters Experiment 2 launching 100 instances(20 of each type) in zone 3 for two account A and B. Credit:[Figure from Thomas s pape, CCS 2009] The same instance type within the same zone use similar IP regions even for different accounts

Enumerate public EC2-based web servers Experiment 1 utilize WHOIS queries, identify 4 distinct IP address prefix associate with EC2 2 perform a tcp connect probe on port 80, result in 11315 responsive IPs. 3 perform a tcp port 443 scan, result in 8375 responsive IPs. 4 translate the public address into an internal EC2 address, result in 14054 potential target.

map of EC2-based web server Goal map the 14054 potential target into a instance type and availability zone. The data we have? 4499 sample instances, which has 997 unique internal IPs and 611 unique Dom0 IPs associated with these instances.

map of EC2-based web server mapping algorithms All IP from a /16 are from the same availability zone. A /24 inherit any included sampled instance type. A /24 containing a Dom0 IP address, we associate this /24 address the type of the Dom0 s associated instance All /24 s between consecutive Dom0 /24 s inherit the former s associated type.

Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm attack 5 Conclusions

Dectecting co-residence co-residence checking algorithms Internal IP address are close.(within 7)

Dectecting co-residence co-residence checking algorithms Internal IP address are close.(within 7) obtain and compare xen Dom0 address. sending TCP SYN and set TTL small: VM->Dom0->VM

Dectecting co-residence co-residence checking algorithms Internal IP address are close.(within 7) obtain and compare xen Dom0 address. sending TCP SYN and set TTL small: VM->Dom0->VM network latency: small packet round-trip times.

Observations On EC2, VMs can be co-resident only if they have identical creation parameters(region, availability zone, instance type) cloud-internal IP address assigned to VMs are strongly correlated with their creation parameters. use EC2 s DNS service to map public IP address to private internal address.

Achieving co-residence Overall strategy Derive target s creation parameters Create similar VMs unitl co-residence is detected.

Achieving co-residence Improvement exploiting EC2 s sequential assignment strategy trigger new creation of new VMs by the victim by inducing load(eg. RightScale)

Experiment probing 1 A single victim instance was launched 2 20 probe instances were launched by another account 3 co-residence checks were performed.

Result Credit:[Figure from Thomas s pape, CCS 2009]

Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm attack 5 Conclusions

What is side-channel attack side-channel attack cross-vm information leakage due to sharing of physical resources.like cpu s data caches, memory bus, network access.

cache attacks example cpu contains small, fast memory cache shared by all applications.

cache attacks example cpu contains small, fast memory cache shared by all applications. if only attacker access memory, it is served from the fast cache.

cache attacks example cpu contains small, fast memory cache shared by all applications. if only attacker access memory, it is served from the fast cache. if victim also access memory, the cache fills up and attacker notices a slow-down.

cache attacks example cpu contains small, fast memory cache shared by all applications. if only attacker access memory, it is served from the fast cache. if victim also access memory, the cache fills up and attacker notices a slow-down. from this, attacker can deduce the memory access pattens of victim

Measuring cache usage Prime+Trigger+Probe techinque allocate buffer B, enough to fill significant portion of caches Prime: Read B at cache line size to ensure it is cache Trigger: busy loops until the cpu s cycle increase by a large value. Probe: Measure the time it take to read B.

Estimating traffic rates performance cache load measurement, and sent http requests at different rates. Credit:[Figure from Thomas s pape, CCS 2009]

Outline 1 Introduction 2 EC2 cloud cartography 3 Co-residence 4 side-channel cross-vm attack 5 Conclusions

Conclusions identify the risk from sharing physical infrastructure using third-party cloud computing suggested countermeasure: let user choose their vm placement policy