Hey, You, Get Off of My Cloud

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Distributed System Lab.1 Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart ¤, Eran Tromer, Hovav.
Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
Lecture 5: Cloud Security: what’s new? Xiaowei Yang (Duke University)
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Yan Qiang,
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
By Christopher Moran, Nicoara Talpes 1.  Solution is addressed to VMs that are web servers  Web servers should not have confidential information anyway.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
This paper states that one of the major problem to the adoption of cloud computing is that of security.  Existing cloud computing problem or concerns.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by Thomas Ristenpart et al. defended by Ning Xia & Najim Yaqubie.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart Eran Tromer Hovav Shacham Stefan Savage.
CLOUD PRIVACY AND SECURITY CS 595 LECTURE 15 4/15/2015.
Authors: Thomas Ristenpart, et at.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
5205 – IT Service Delivery and Support
N. GSU Slide 1 Chapter 04 Cloud Computing Systems N. Xiong Georgia State University.
BOTNETS & TARGETED MALWARE Fernando Uribe. INTRODUCTION  Fernando Uribe   IT trainer and Consultant for over 15 years specializing.
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
Self-service Cloud Computing Shakeel Butt Department of Computer Science Rutgers University.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Cloud Computing Cloud Security– an overview Keke Chen.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan.
Eliminating Fine Grained Timers in Xen Bhanu Vattikonda with Sambit Das and Hovav Shacham.
M.A.Doman Short video intro Model for enabling the delivery of computing as a SERVICE.
Software Security Testing Vinay Srinivasan cell:
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Thoughts on Firewalls: Topologies, Application Impact, Network Management, Tech Support and more Deke Kassabian, April 2007.
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Cloud security Tom Ristenpart CS Software-as-a-service Infrastructure-as-a- service Cloud providers Cloud computing NIST: Cloud computing is a model.
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS Eran Tromer MIT Hovav Shacham UCSD Stefan Savage UCSD ACM CCS.
A paper by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security,
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Improving Xen Security through Disaggregation Derek MurrayGrzegorz MilosSteven Hand.
Security in Cloud Computing Zac Douglass Chris Kahn.
Search Worms, ACM Workshop on Recurring Malcode (WORM) 2006 N Provos, J McClain, K Wang Dhruv Sharma
Security Vulnerabilities in A Virtual Environment
Company LOGO User Authentication Threat Modelling from User and Social Perspective “Defending the Weakest Link: Intrusion.
SEMINAR ON IP SPOOFING. IP spoofing is the creation of IP packets using forged (spoofed) source IP address. In the April 1989, AT & T Bell a lab was among.
CLOUD COMPUTING-3.
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf.
Database Laboratory Regular Seminar TaeHoon Kim Article.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
General Information: This document was created for use in the "Bridges to Computing" project of Brooklyn College. You are invited and encouraged to use.
Thomas Ristenpart , Eran Tromer, Hovav Shacham ,Stefan Savage CCS’09
Network security Vlasov Illia
Mapping/Topology attacks on Virtual Machines
BUILD SECURE PRODUCTS AND SERVICES
Threat Modeling for Cloud Computing
Hey, You, Get Off of My Cloud
Cloud Security– an overview Keke Chen
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
Forensics Week 12.
Exploring Information Leakage in Third-Party Compute Clouds
Presentation transcript:

Hey, You, Get Off of My Cloud Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart et al. Edward Wu

Structure High Level Picture/Motivation Thread Model Approach Mitigations Pros/Cons What's New/Not New in Cloud Security? Acknowledgement: slides/thoughts borrowed from Prof. Ragib Hasan's lecture notes and UIUC Security Reading Group's reviews

Conference & Authors CCS 09 Influential, cited by 226 papers in 2 years (Google Scholar) Media coverage: MIT Technology Review, Network World, Network World (2), Computer World, Data Center Knowledge, IT Business Edge, Cloudsecurity.org, Infoworld First work on cloud cartography Attack launched against commercially available ”real” cloud (Amazon EC2) Claims up to 40% success in co-residence with target VM

High Level Picture Traditional system security mostly means keeping bad guys out. The attacker needs to either compromise the auth/access control system, or impersonate existing users. But clouds allow co-tenancy: Multiple independent users share the same physical infrastructure. An attacker can legitimately be in the same physical machine as the target

Challenges for the attacker How to find out WHERE the target is located How to CO-LOCATE with the target in the same physical machine How to GATHER INFORMATION about the target

Approach Map the cloud infrastructure to find where the target is located Use various heuristics to determine co-residence of two VMs Launch probe VMs trying to be co-residence with target VMs Exploit cross-VM leakage to gather information about the target

Threat Model Attacker Model Cloud infrastructure provider is trustworthy Cloud insiders are trustworthy Attacker is a malicious third party who can legitimately use cloud provider's service Assets Confidentiality aware services run on cloud Availability of services run on cloud

Threat Model Attacker Model Cloud infrastructure provider is trustworthy Cloud insiders are trustworthy Attacker is a malicious third party who can legitimately use cloud provider's service Assets Confidentiality aware services run on cloud Availability of services run on clou

The Amazon EC2 Xen hypervisor, called Domain0, is used to manage guest images, physical resource provisioning, and access control rights. Dom0 routes packages and reports itself as a first hop. Consists of 2 regions (United States and Europe), each have 3 availability zones, 5 Linux instance types. (outdated!) Instances have a one-to-one mapping of internal IP addresses and external IP addresses, which are static

Mapping the Cloud Plot of internal IPs against zones Result: Different availability zones correspond to different statically defined internal IP address ranges.

Mapping the Cloud Plot of internal IPs in Zone 3 against instance types Result: Same instance types correspond loosely with similar IP address range regions.

Determine Co-residence Network-based co-resident checks: instances are likely co-resident if they have: matching Dom0 IP address small packet round-trip times numerically close internal IP addresses (within 7) Verified via a hard-disk-based covert channel Conclusion of test: Effective false positive rate of ZERO for the co-resident checks.

Probe VM Placement Strategy 1: Brute-forcing placement a success rate of 8.4% Strategy 2: Abusing Placement Locality Attacker knows when the target instances will be launched Inference avaliability zone and instance type from its IP Instance flooding immediately following launch of instance by launch many instances simultaneously. Achieves a success rate of 40%

Information Leakage Co-Residency affords the ability to: Denial of Service Estimate victim's work load Cache Network Traffic Extract cryptographic keys via cache-based side channels. Other cross-VM attacks

Mitigations Mapping: Use a randomized scheme to allocate IP addresses Block some scanning tools/activities (nmap,traceroute) Co-residence checks: Prevent identification of dom0/hypervisor

Mitigations Co-location: Not allow co-residence at all: Beneficial for cloud users Not efficient for cloud providers N-tier trust model? Information leakage: Prevent cache load attacks?

Amazon's response Amazon downplays report highlighting vulnerabilities in its cloud service "The side channel techniques presented are based on testing results from a carefully controlled lab environment with configurations that do not match the actual Amazon EC2 environment." "As the researchers point out, there are a number of factors that would make such an attack significantly more difficult in practice." http://www.techworld.com.au/article/324189/amazon_ downplays_report_highlighting_vulnerabilities_its_clo ud_service

Pros Shows preliminary work in side channel attacks in VMs. Demonstrates the practicality of their attacks on Amazon EC2. Covers precise attack model. Simple tools are used to launch attack which are easily available to any attacker. Covers potential measures to take to inhibit such attacks.

Cons Are the side channels really effective? How much an attacker can leverage the information leaked out using this scheme. If the target is on a full system it is not attackable by using this scheme.

What is not New? What’s New About Cloud Computing Security?Yanpei Chen, Vern Paxson, Randy H. Katz Argued that few cloud computing security issues are fundamentally new or fundamentally intractable. Remember the good old time-sharing systems such as Multics, National CCS?

What is not New? Phishing, downtime, data loss, password weaknesses, and compromised hosts running botnets Most research continues on web security, data outsourcing and assurance, and virtual machines Servers in cloud computing currently operate as (in)securely as servers in traditional enterprise datacenters Zeus running its C&C server on EC2 in 2009

What's New in Cloud Security? Unexpected side channels (passively observing information) and covert channels Reputation fate-sharing: spam filter blacklist, police raid, server crash

Novelties in the cloud threat model Data and software are not the only assets worth protecting, activity patterns also need to be protected. Need to accommodate a longer trust chain. (incentives for companies to specialize) Competitive businesses can operate within the same cloud computing ecosystem. Mutual auditability, between cloud users and providers Potentially inaccurate mental models of cloud computing as an always-available service, leads to false sense of security (EC2 Crash)