Sustainability of Service Provisioning Systems under Attack Georgios S. Paschos

Leandros Tassiulas

MIT, USA CERTH-ITI, Greece

University of Thessaly, Greece

[email protected]

[email protected]

ABSTRACT We propose a resource allocation model that captures the interaction between legitimate users of a distributed service provisioning system with malicious intruders attempting to disrupt its operation. The system consists of a bank of servers providing service to incoming requests. Malicious intruders generate fake traffic to the servers attempting to degrade service provisioning. Legitimate traffic may be balanced using available mechanisms in order to mitigate the damage from the attack. We characterize the guaranteed region, i.e. the set of legitimate traffic intensities that are sustainable given specific intensities of the fake traffic, under the assumption that the fake traffic is routed using static policies. This assumption will be relaxed, allowing arbitrary routing policies, in the full version of this work.

Categories and Subject Descriptors H.1 [Information Systems Applications]: Models and Principles; Miscellaneous;

General Terms Algorithms, Reliability, Theory

Keywords Service provisioning system; guaranteed sustainability; stability

1.

SYSTEM MODEL AND DEFINITIONS

Consider a set N , {1, . . . , N } of parallel servers with constant service rates µn , n ∈ N . The servers are fed by a set of legitimate streams L , {1, . . . , |L|} of traffic, each stream l ∈ L associated with traffic intensity al and a set of reachable servers Sl ⊆ N . The traffic arriving from a stream l is routed to some of the servers in Sl . A malicious system launches a Degradation of Service attack (a type of Denial of Service attack) in order to disrupt the operation of the system. In particular, the malicious system has a set M , {1, . . . , |M|} of malicious traffic streams, where the stream m ∈ M generates fake traffic with intensity bm and is capable of routing it towards a subset of servers Qm ⊆ N . See Figure 1 for an example of the studied system in terms of a bipartite graph. We assume the operation of two controllers with conflicting interests. Controller 1 splits legitimate traffic to alCopyright is held by the author/owner(s). SIGMETRICS’13, June 17–21, 2013, Pittsburgh, PA, USA. ACM 978-1-4503-1900-3/13/06.

routing controller 2

routing controller 1 a1 1

b1

a2 b2

legitimate streams

2

servers

a3

malicious system

legitimate traffic bogus traffic

Figure 1: An example of the system for 2 servers, 3 legitimate streams and 2 malicious streams. Also, S1 = Q1 = {1}, S2 = Q2 = {1, 2} and S3 = {2}. lowable servers according to routing coefficients P fln , (l, n) ∈ L × N . We collect all policies that satisfy n∈N fln = al and fln = 0, if n ∈ / Sl in the feasible set Π1 . Controller 2 operates in a similar manner, P choosing coefficients φmn , (m, n) ∈ M × N to satisfy n∈N φmn = bm and φmn = 0, if n ∈ / Qm for all m. Π2 is the set of malicious policies. The typical stability condition for a server reads: a server n is stable iff the aggregate arrival intensity is smaller or equal to its service rate; this is referred to as rate stability. From the practical viewpoint, though, the DEGoS attack is considered successful only if service to legitimate traffic fails. If some servers are unstable in the traditional sense but they are avoided by the legitimate traffic then the attack has failed to harm the system. Thus, we slightly change the definition of stability as follows: Definition 1. (System Stability) A server n ∈ N is staX X ble if fln + φmn ≤ µn l∈L

m∈M

P or if l∈L fln = 0. The system is stable if all servers are stable. Let a , (a1 , . . . , a|L| ) denote the vector of legitimate traffic intensities. We extend the standard notion of system stability region to include the impact of a malicious intruder with fake traffic intensities b , (b1 , . . . , b|M| ) and policy φ. Definition 2. (Sustainable region Λφ b ) The sustainable region Λφ , when the malicious adversary operates with a b malicious policy φ ∈ Π2 and available fake traffic intensities b, is the set of all a for which there exists a legitimate policy f ∈ Π1 such that the system is stable. Moreover, we define the notion of guaranteed sustainable (or simply “guaranteed”) region as the set of legitimate traffic intensities a which are guaranteed to be sustainable regardless of the malicious policy used.

Definition 3. (Guaranteed region Λb ) The guaranteed region Λb of the system attacked by a malicious adversary with available traffic intensities b, is the set of all a for which there exists a legitimate policy f ∈ Π1 such that the system remains stable under any selection φ ∈ Π2 . The guaranteed region is parametrized by the fake traffic intensity, b. For b large enough, Λb might contain only the zero element vector 0 , (0, 0, . . . , 0), which implies that there is a malicious policy φ such that even arbitrarily small legitimate traffic intensities are not sustainable, regardless of the legitimate policy f used. In practical terms, we can think of such a situation as a DoS attack. The DEGoS attack, on the other hand, corresponds to cases where the guaranteed region is not degenerated and legitimate traffic can still be sustained despite the attack, albeit in smaller intensities.

2.

MAIN RESULT

First, we fix a malicious policy φ and study the sustainable region of traffic intensities under this policy. Let rn (φ) , + P µn − m∈M φmn be the available resource of server n after the traffic arriving from malicious streams under φ is subtracted. We use (.)+ , max{., 0}. Using the stability definition, we conclude that the system is stable iff there exists a legitimate policy f such that X fln ≤ rn (φ), for all n ∈ N . (1) l∈L

In what follows, we will express the sustainable region Λφ b in terms of traffic intensities a, b and service rates µ. For an ˆ ⊆ N consider arbitrary non-empty subset of the servers N ˆ M, ˆ where the induced subsets L, n o ˆ is the set of legitimate traf• Lˆ = l ∈ L : Sl ⊆ N fic streams that must direct all traffic to some of the ˆ and servers in N n o ˆ = m ∈ M : Qm ∩ N ˆ = • M 6 ∅ is the set of fake traffic streams that can direct fake traffic to some of the ˆ. servers in N Lemma 1 (Cut constraints). The traffic intensities a are sustainable under φ if and only if X X ˆ ⊆ N. al ≤ rn (φ), for all N ˆ l∈L

2.1

ˆ n∈N

Guaranteed region Λb

ˆ ) = (V, E). We define Consider an auxiliary network G(N ˆ j∈N ˆ }, where the set of nodes as V , {s, t, ui , vj : i ∈ M, ˆ corres is the source node, t is the sink, nodes ui , i ∈ M ˆ and nodes vj , j ∈ N ˆ correspond spond to members of M ˆ . The set of links consists of three subsets to members of N E = Eµ ∪ EQ ∪ Eb , where each subset consists of directional links defined as follows ˆ Eµ , {(vj , t) : j ∈ N ˆ} Eb , {(s, ui ) : i ∈ M}, ˆ j ∈ Qi }. EQ , {(ui , vj ) : i ∈ M, A link (s, ui ) has capacity bi , a link (vi , t) has capacity µi , while all links in subset EQ have infinite capacity. Let ˆ ) denote the maximum s-t flow of network G(N ˆ ). Mmax (N

a (0,2)

Legitimate wins

Λb

(0,1) 0

(1,0) (2,0)

Λbsta

Depends on dynamic/static Malicious wins

b

Figure 2: Regions of the studied example for the case of static policies (Λsta b ) and for the dynamic (Λb ). The sensitivity of the guaranteed sustainability to dynamic malicious policies is visible. Definition 4 (Conditions C.1). The following inequality is satisfied X X ˆ ), ˆ ⊆ N. al ≤ µn − Mmax (N for all N (2) ˆ l∈L

ˆ n∈N

Theorem 1. (Guaranteed region) Conditions C.1 are necessary and sufficient to guarantee sustainability for the traffic intensity a under any φ.

3.

DISCUSSION OF THE DYNAMIC CASE

In the followup work we extend the study to the case of dynamic routing polices. In case controller 2 is static, Join the Shortest Queue turns out to be the optimal policy for the legitimate controller and it can be shown that the guaranteed region described here is achieved by this policy. If, however, the controller 2 is allowed to allocate bogus jobs in a dynamic fashion, the guaranteed region changes drastically. Below we demonstrate this in an example.

3.1

An example with two servers

Consider two servers with unit service rate fed by one legitimate stream with traffic a and one malicious with traffic b. Traffic can be routed to both servers. Using the results of the previous section, we conclude that a + b ≤ 2 is a necessary and sufficient condition for guaranteed sustainability as long as the malicious intruder is constrained to static routing policies. We call this region Λsta b , see Figure 2. Definition 5 (Switching malicious policies). A switching malicious policy directs all fake traffic to one server during a time interval of length τi , alternating the server in each interval. During the ith interval, i = 1, 2, . . . , the fake traffic is directed to server 1 + (i + 1 mod 2). The duration of the ith interval is given by the sequence τi , i = 1, 2, . . . . Theorem 2 (Region under dynamic policies). The guaranteed region for the example of two unit servers is a+b≤2 a=0

if b ≤ 1 if b > 1.

Examples of switching malicious policies that intuitively lead to the above result are: τi = i and τi = 2i .

4.

ACKNOWLEDGMENTS

The work of G. Paschos is supported by the WiNC project of the Action:Supporting Postdoctoral Researchers, funded by national and Community funds (European Social Fund).

Sustainability of Service Provisioning Systems ... - Georgios Paschos

Jun 17, 2013 - Leandros Tassiulas. University of Thessaly, Greece [email protected]. ABSTRACT. We propose a resource allocation model that captures the interaction between legitimate users of a distributed service provisioning system with malicious intruders attempting to disrupt its operation. The system consists of a ...

284KB Sizes 1 Downloads 145 Views

Recommend Documents

Sustainability of Service Provisioning Systems ... - Georgios Paschos
Jun 17, 2013 - bility region to include the impact of a malicious intruder with fake traffic intensities .... Join the Shortest Queue turns out to be the optimal policy.

Sustainability of Service Provisioning Systems under ...
A malicious system launches a Degradation of Service at- tack (a type of Denial of Service attack) in order to disrupt the operation of the system. In particular, the malicious sys- tem has a set M. {1,..., |M|} of malicious traffic streams, where th

Beamforming capacity optimization for MISO ... - Georgios Paschos
achieving solution. In this paper, we solve the beamforming ca- pacity optimization problem by following an analytical approach that projects the beamforming ...

Beamforming capacity optimization for MISO ... - Georgios Paschos
pacity optimization problem by following an analytical approach that projects the ...... of Electrical Engineering and Computer Science in the University of Patras, ...

evolution of wireless access provisioning: a systems ...
business architectures and by studying the evolution of value systems with cycle .... Scale-free networks are networks that contain a small number of highly ..... as capacity became limited GSM was deployed on the newly allocated 1800 MHz ...

Provisioning Systems to Share the Wealth of SAS - SAS Support
Mar 7, 2014 - 10. Step 3: Create an SCCM package for the SAS software . .... Companies such as Microsoft have implemented systems management ...

User-Centric Service Provisioning for IMS
single operator for the access network, IMS core, user pro- file and ..... Home Network (IMS core). Service Provider Network. PfS. 3. INVITE (initial. SDP offer). 1.

Bare-Metal provisioning of Internet of Things devices by ... - GitHub
The Internet of Things (IoT) is currently one of the most relevant trends of the software ... which are used for materializing the Node Templates in a service topology. ... different firmware, configuration and network information to the devices.

OPTIMAL RESOURCE PROVISIONING FOR RAPIDLY ...
OPTIMAL RESOURCE PROVISIONING FOR RAPIDL ... UALIZED CLOUD COMPUTING ENVIRONMENTS.pdf. OPTIMAL RESOURCE PROVISIONING FOR ...