A paper by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security,

Slides:



Advertisements
Similar presentations
Distributed System Lab.1 Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Thomas Ristenpart ¤, Eran Tromer, Hovav.
Advertisements

Rohit Kugaonkar CMSC 601 Spring 2011 May 9 th 2011
Lecture 5: Cloud Security: what’s new? Xiaowei Yang (Duke University)
Lecture 4: Cloud Computing Security: a first look Xiaowei Yang (Duke University)
Ragib Hasan Johns Hopkins University en Spring 2010 Lecture 3 02/15/2010 Security and Privacy in Cloud Computing.
CloudStack Scalability Testing, Development, Results, and Futures Anthony Xu Apache CloudStack contributor.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Yan Qiang,
OPNET Technologies, Inc. Performance versus Cost in a Cloud Computing Environment Yiping Ding OPNET Technologies, Inc. © 2009 OPNET Technologies, Inc.
Ragib Hasan Johns Hopkins University en Spring 2011 Lecture 11 04/25/2011 Security and Privacy in Cloud Computing.
Infrastructure as a Service (IaaS) Amazon EC2
Resource-Freeing Attacks: Improve Your Cloud Performance (at Your Neighbor's Expense) (Venkat)anathan Varadarajan, Thawan Kooburat, Benjamin Farley, Thomas.
Public Clouds (EC2, Azure, Rackspace, …) VM Multi-tenancy Different customers’ virtual machines (VMs) share same server Provider: Why multi-tenancy? Improved.
Hey You, Get Off My Cloud: Exploring information Leakage in third party compute clouds T.Ristenpart, Eran Tromer, Hovav Shacham and Steven Savage ACM CCS.
Hey, You, Get Off of My Cloud
By Christopher Moran, Nicoara Talpes 1.  Solution is addressed to VMs that are web servers  Web servers should not have confidential information anyway.
Ken Birman. Massive data centers We’ve discussed the emergence of massive data centers associated with web applications and cloud computing Generally.
Towards High-Availability for IP Telephony using Virtual Machines Devdutt Patnaik, Ashish Bijlani and Vishal K Singh.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds by Thomas Ristenpart et al. defended by Ning Xia & Najim Yaqubie.
SYN Flooding: A Denial of Service Attack Shivani Hashia CS265.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds By Thomas Ristenpart Eran Tromer Hovav Shacham Stefan Savage.
Authors: Thomas Ristenpart, et at.
Secure Cloud Computing with Virtualized Network Infrastructure HotCloud 10 By Xuanran Zong.
PROS & CONS of Proxy Firewall
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Hey, You, Get Off of My Cloud: Exploring Information Leakage in Third-Party Compute Clouds Written by Thomas Ristenpart Eran Tromer Hovav Shacham Stehan.
Eliminating Fine Grained Timers in Xen Bhanu Vattikonda with Sambit Das and Hovav Shacham.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
SECURITY IN CLOUD COMPUTING By Bina Bhaskar Anand Mukundan.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Improving Network I/O Virtualization for Cloud Computing.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Ian Alderman A Little History…
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2012 Lecture 4 09/10/2013 Security and Privacy in Cloud Computing.
Autonomic SLA-driven Provisioning for Cloud Applications Nicolas Bonvin, Thanasis Papaioannou, Karl Aberer Presented by Ismail Alan.
CS332, Ch. 26: TCP Victor Norman Calvin College 1.
Presented by: Mostafa Magdi. Contents Introduction. Cloud Computing Definition. Cloud Computing Characteristics. Cloud Computing Key features. Cost Virtualization.
Team 6: (DDoS) The Amazon Cloud Attack Kevin Coleman, Jeffrey Starker, Karthik Rangarajan, Paul Beresuita, Arunabh Verma and Amay Singhal.
Thomas Ristenpart,Eran Tromer, Horav Shahcham and Stefan Savage
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
Cloud security Tom Ristenpart CS Software-as-a-service Infrastructure-as-a- service Cloud providers Cloud computing NIST: Cloud computing is a model.
HEY, YOU, GET OFF OF MY CLOUD: EXPLORING INFORMATION LEAKAGE IN THIRD-PARTY COMPUTE CLOUDS Eran Tromer MIT Hovav Shacham UCSD Stefan Savage UCSD ACM CCS.
Scanning & Enumeration Lab 3 Once attacker knows who to attack, and knows some of what is there (e.g. DNS servers, mail servers, etc.) the next step is.
SECURING SELF-VIRTUALIZING ETHERNET DEVICES IGOR SMOLYAR, MULI BEN-YEHUDA, AND DAN TSAFRIR PRESENTED BY LUREN WANG.
Operating Systems ECE344 Ashvin Goel ECE University of Toronto Demand Paging.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
DoS/DDoS attack and defense
References: “Hey, You, Get Off My Cloud: Exploring Information Leakage in Third-Party Compute Clouds” by Thomas Ristenpart, Eran Tromer – UC San Diego;
Hey, You, Get Off of My Cloud Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage Presented by Daniel De Graaf.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
Emerging applications in cloud High performance computing E-Commerce Media hosting Web hosting Content delivery... –from Amazon AWS survey 1 Emulated network.
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, Bob Gilbert, Martin Szydlowski, Richard Kemmerer, Christopher Kruegel, and Giovanni Vigna Proceedings.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
Amazon Web Services. Amazon Web Services (AWS) - robust, scalable and affordable infrastructure for cloud computing. This session is about:
Thomas Ristenpart , Eran Tromer, Hovav Shacham ,Stefan Savage CCS’09
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Mapping/Topology attacks on Virtual Machines
Port Scanning James Tate II
Hey, You, Get Off of My Cloud
Container-based Operating System Virtualization: A scalable, High-performance Alternative to Hypervisors Stephen Soltesz, Herbert Potzl, Marc E. Fiuczynski,
Written by : Thomas Ristenpart, Eran Tromer, Hovav Shacham,
”The Ball” Radical Cloud Resource Consolidation
OS Virtualization.
Cloud computing mechanisms
AWS Cloud Computing Masaki.
Exploring Information Leakage in Third-Party Compute Clouds
Presentation transcript:

A paper by Thomas Ristenpart, Eran Tromer, Hovav Shacham, and Stefan Savage, Proceedings of the ACM Conference on Computer and Communications Security, Chicago, IL, November Presented by John Cain

De-centralize software and data to scale to hardware availability One OS One Server 12 Operating Systems 6 servers

XEN Hypervisor Dom 0 VM1 VM2 VM3 CLOUD SERVER ## CPU RAM Network HDD

 Amazon EC2 cloud to find a target server  Amazon’s EC2 operates with 2 physical regions (US and Europe)  3 availability zones for each region  Before beginning a VM instance you are asked to choose: the region, the availability zone and the instance-type related to hardware requirements.  Hardware choices amount to 5 types  32bit  M1.small (1 ECU GHz 2007 Opteron – 1.7GB memory and 160GB storage) $.10/hr  C1.medium  64bit  M1.large (2 virtual cores each with 2 ECU– 7.5GB memory and 850GB storage) $.40/hr  M1.xlarge  C1.xlarge

 NMAP to perform TCP Connect probes  TCP SYN traceroutes – sends TCP SYN packets with increasing TTL until no ACK is received  Map the EC2 cloud via DNS entries  One set - External public IP DNS vs internal queries  Second set – varied EC2 instances and checking IP  4 distinct IP prefixes {/16, /17, /18,/19}  unique internal IPs

 Account A  20 instances for each availability/instance type  92 had unique /24 prefixes  Account B  100 instances (20 per type) in Zone 3 (39 hours after A)  88 unique /24 prefixes

 Processing the data – the defining heuristic  All IPs from /16 are from the same availability zone  A /24 inherits any included sampled instance type  A /24 containing a Dom0 IP address only contains Dom0 IP Addresses  All /24s between two consecutive Dom0 inherit the former’s instance type  Dom0 IPs are consistently assigned a prefix that immediately precedes the instance IPs they are associated with –  869 /24s in data  Unique zone and type to 723  23 unique zone with 2 types  123 unlabeled

 Network based co-residence checks  Exploiting hard disk based covert channel between EC2 instances  Co-resident if  Matching Dom0 IP address  Small packet round-trip times  Numerically close internal IP addresses (within 7)  Exploiting placement  A single account was never seen to have two instances running on a physical machine  No more than (8) m1.small instances were running on a machine CountMedian RTT (ms) Co-resident Instance Zone1 Crl A Zone1 Crl B Zone2 Crl A Zone2 Crl B Zone3 Crl A Zone3 Crl B

 Brute Force  Run numerous instances over a long period of time - determine amount of instances that were able to form co-residence with  Using the ‘cloud map’ Zone 3 / m1.small (1686 servers)  78 unique Dom0 IPs  1785 instance probes  141 victim servers were hit (8.4% coverage)  Instance Flooding  Abuse scalable infrastructures – when service scales to meet demand determine server and try to join it  Instances tend to restart on the same physical server  New instances started after an instance starts will tend to be placed nearby  A single account will not have more than 1 instance started on a single platform

 Cross VM leakage  Stealing crypto keys through cache-based side channels  Denial of service by attacker instance physical resource usage  Cache-based covert channel  Sender idles to transmit “0” and accesses memory to transmit “1”  Receiver accesses memory block and observes the latencies perceived to be flushing of the cache  Estimating Traffic Rates  Keystroke Timing Attack  Similar to cache-based load measurements  Hope to catch password input via shell and detect the time in between keys to gather length

 This paper contributes greatly to the understanding of mapping of the EC2 cloud both in practical application and in cloud security  The authors include commentary in each section expressing the validity of each attack attempt and the ease to correct it  Shows the robust nature of the EC2 cloud –  Easiest option for commercial ventures is to pick a M1.xlarge or CL1.xlarge as they fill the entire physical platform and deny co-residence  Xen’s resource exclusion is not perfect but nearly impossible to exploit – improved with software randomization tweaks to cache

 Mapping was mostly at random, co-residence was extremely low even with techniques applied  Instance placement was time sensitive which is constantly updating and changing  With the exception of one m1.large instance, only m1.smalls are able to co-reside and not really applicable to commercial applications  The side channel analysis was weak and speculative; they didn’t seem to run any hard penetration testing utilities but focused on very low level cpu-cache analysis

 This idea could be improved with more financial resources to run hundreds of accounts with the maximum 20 instances all at the same time  Taking further the idea of side-channel attacks to combine traditional attacks with having co-located instances. This could make the extremely small bandwidth side channels they were able to exploit more practicable. With resource starvation traditional attacks might be more effective  Poisoning dom0 resource mapping to gain further access

 My thoughts –  project was mostly unsuccessful in demonstrating anything actionable  The EC2 cloud is potentially dangerous for how accessible it makes gaining access to vast computational and bandwidth resources for launching attacks on other networks Thanks