Authors: Thomas Ristenpart, et at.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Distributed System Lab.1 Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart ¤, Eran Tromer, Hovav.
Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
Lecture 5: Cloud Security: what’s new? Xiaowei Yang (Duke University)
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
Code-Red : a case study on the spread and victims of an Internet worm David Moore, Colleen Shannon, Jeffery Brown Jonghyun Kim.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Yan Qiang,
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 2 08/21/2012 Security and Privacy in Cloud Computing.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 3 02/14/2010 Security and Privacy in Cloud Computing.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense) (Venkat)anathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas.
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS.
Hey, You, Get Off of My Cloud
Security Issues and Challenges in Cloud Computing
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
By Christopher Moran, Nicoara Talpes 1.  Solution is addressed to VMs that are web servers  Web servers should not have confidential information anyway.
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 5 03/08/2010 Security and Privacy in Cloud Computing.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by Thomas Ristenpart et al. defended by Ning Xia & Najim Yaqubie.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 10 04/18/2011 Security and Privacy in Cloud Computing.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart Eran Tromer Hovav Shacham Stefan Savage.
CLOUD PRIVACY AND SECURITY CS 595 LECTURE 15 4/15/2015.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2013 Lecture 3 09/03/2013 Security and Privacy in Cloud Computing.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
5205 – IT Service Delivery and Support
Threat Modeling for Cloud Computing (some slides are borrowed from Dr. Ragib Hasan) Keke Chen 1.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
Lecture 10 Cloud Security
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 2 02/01/2010 Security and Privacy in Cloud Computing.
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan.
Eliminating Fine Grained Timers in Xen Bhanu Vattikonda with Sambit Das and Hovav Shacham.
Cloud Computing 1. Outline  Introduction  Evolution  Cloud architecture  Map reduce operation  Platform 2.
The Blue Book pages 19 onwards
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Xen (Virtual Machine Monitor) Operating systems laboratory Esmail asyabi- April 2015.
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
CHAPTER 3 Classes of Attack. INTRODUCTION Network attacks come from both inside and outside firewall. Kinds of attacks: 1. Denial-of-service 2. Information.
Cloud security Tom Ristenpart CS Software-as-a-service Infrastructure-as-a- service Cloud providers Cloud computing NIST: Cloud computing is a model.
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS Eran Tromer MIT Hovav Shacham UCSD Stefan Savage UCSD ACM CCS.
A paper by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security,
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
SECURING SELF-VIRTUALIZING ETHERNET DEVICES IGOR SMOLYAR, MULI BEN-YEHUDA, AND DAN TSAFRIR PRESENTED BY LUREN WANG.
Security Vulnerabilities in A Virtual Environment
Overview of Firewalls. Outline Objective Background Firewalls Software Firewall Hardware Firewall Demilitarized Zone (DMZ) Firewall Types Firewall Configuration.
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
DIVYA K 1RN09IS016 RNSIT1. Cloud computing provides a framework for supporting end users easily through internet. One of the security issues is how to.
Thomas Ristenpart , Eran Tromer, Hovav Shacham ,Stefan Savage CCS’09
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Mapping/Topology attacks on Virtual Machines
Threat Modeling for Cloud Computing
Port Scanning James Tate II
Hey, You, Get Off of My Cloud
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
Unit 27: Network Operating Systems
The Blue Book pages 19 onwards
Firewall Installation
Exploring Information Leakage in Third-Party Compute Clouds
Presentation transcript:

Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Authors: Thomas Ristenpart, et at. Defended by Vaibhav Rastogi and Yi Yang

Introduction Introduction EC2 Service, Network Probing Attacking Steps Cloud Cartography Placement Extraction Discussion

Traditional system security mostly means keeping bad guys out. The attacker needs to either compromise the auth/access control system, or impersonate existing users

But clouds allow co-tenancy : Multiple independent users share the same physical infrastructure So, an attacker can legitimately be in the same physical machine as the target.

How to find out where the target is located How to be co-located with the target in the same (physical) machine How to gather information about the target

Exploring Information Leakage in Third-Party Compute Clouds First work on cloud cartography Attack launched against commercially available “real” cloud (Amazon EC2) Up to 40% success in co-residence with target VM

Cloud infrastructure provider is trustworthy Cloud insiders are trustworthy Attacker is a malicious third party who can legitimately the cloud provider as a client Threat: An attacker’s instances can run on the same physical hardware as potential victims. Therefore, the attacker might manipulate shared physical resources (eg. CPU caches, network queues, etc) to learn otherwise confidential information.

Attack Tasks  Map the cloud infrastructure to find where the target is located Use various heuristics to determine co-residency of two VMs Launch probe VMs trying to be co-resident with target VMs Exploit cross-VM leakage to gather information about target

[Figures from Xen Wiki] The EC2 Service The EC2 service enables users to flexibly rent computational resources for use by their applications. A privileged virtual machine, called Domain0, is configured to route packets for its guest images and reports itself as a hop in traceroutes. 2 Regions, 3 Availability zones, 5 instance types. Each instance has one internal IP and one external IP. Both are static. For example: External IP: 75.101.210.100 Internal IP: 10.252.146.52 [Figures from Xen Wiki]

Network Probing Nmap, hping, wget for network probing Nmap is a security scanner used to discover hosts and services on a computer network, thus creating a "map" of the network. hping is a packet generator and analyzer for the TCP/IP protocol. Wget is a computer program that retrieves content from web servers. By using such tools, we can understand VM placement in the EC2 system and provide evidence of co-residence.

Finding: Different availability zones correspond to different internal IP address ranges;

Finding: same instance type within the same zone = similar IP regions

Task 2: Determining co-residence Check to determine if a given VM is placed in the same physical machine as another VM Instances are likely co-resident if they have (1) matching Dom0 IP address, (2) small packet round-trip times, or (3) numerically close internal IP addresses (e.g. within 7).

Task #3: Making a probe VM co-resident with target VM Brute force scheme Idea: figure out target’s availability zone and type Launch many probe instances in the same area Success rate: 8.4%, but on large target set

Task #3: Making a probe VM co-resident with target VM Smarter strategy: utilize locality Idea: VM instances launched right after target are likely to be co-resident with the target Success rate: 40%!

Task #3: Making a probe VM co-resident with target VM Window of opportunity is quite large, measured in days

Task #4: Gather leaked information Now that the VM is co-resident with target, what can it do? Gather information via side channels Perform DoS

Task 4.1: Gathering information Measure latency of cache loads Use that to determine Co-residence Traffic rates Keystroke timing

Credits Slides based on work of Ragib Hasan Johns Hopkins University

Mitigation strategies #1: Mapping Use a randomized scheme to allocate IP addresses Block some tools (nmap, traceroute)

Mitigation strategies #2: Co-residence checks Prevent traceroute (i.e., prevent identification of dom0)

Mitigation strategies #3: Co-location Not allow co-residence at all Beneficial for cloud user Not efficient for cloud provider

Mitigation strategies #4: Information leakage Prevent cache load attacks?

Discussion How is the problem different from other attacks? What’s so special about clouds?