TY - GEN
T1 - Kubernetes Autoscaling
T2 - 11th International Conference on Cloud Computing and Services Science, CLOSER 2021
AU - David, Ronen Ben
AU - Barr, Anat Bremler
N1 - Publisher Copyright: Copyright © 2021 by SCITEPRESS – Science and Technology Publications, Lda. All rights reserved
PY - 2021
Y1 - 2021
N2 - In recent years, we have witnessed a new kind of DDoS attack, the burst attack(Chai, 2013; Dahan, 2018), where the attacker launches periodic bursts of traffic overload on online targets. Recent work presents a new kind of Burst attack, the YoYo attack (Bremler-Barr et al., 2017) that operates against the auto-scaling mechanism of VMs in the cloud. The periodic bursts of traffic loads cause the auto-scaling mechanism to oscillate between scale-up and scale-down phases. The auto-scaling mechanism translates the flat DDoS attacks into Economic Denial of Sustainability attacks (EDoS), where the victim suffers from economic damage accrued by paying for extra resources required to process the traffic generated by the attacker. However, it was shown that YoYo attack also causes significant performance degradation since it takes time to scale-up VMs. In this research, we analyze the resilience of Kubernetes auto-scaling against YoYo attacks. As containerized cloud applications using Kubernetes gain popularity and replace VM-based architecture in recent years. We present experimental results on Google Cloud Platform, showing that even though the scale-up time of containers is much lower than VM, Kubernetes is still vulnerable to the YoYo attack since VMs are still involved. Finally, we evaluate ML models that can accurately detect YoYo attack on a Kubernetes cluster.
AB - In recent years, we have witnessed a new kind of DDoS attack, the burst attack(Chai, 2013; Dahan, 2018), where the attacker launches periodic bursts of traffic overload on online targets. Recent work presents a new kind of Burst attack, the YoYo attack (Bremler-Barr et al., 2017) that operates against the auto-scaling mechanism of VMs in the cloud. The periodic bursts of traffic loads cause the auto-scaling mechanism to oscillate between scale-up and scale-down phases. The auto-scaling mechanism translates the flat DDoS attacks into Economic Denial of Sustainability attacks (EDoS), where the victim suffers from economic damage accrued by paying for extra resources required to process the traffic generated by the attacker. However, it was shown that YoYo attack also causes significant performance degradation since it takes time to scale-up VMs. In this research, we analyze the resilience of Kubernetes auto-scaling against YoYo attacks. As containerized cloud applications using Kubernetes gain popularity and replace VM-based architecture in recent years. We present experimental results on Google Cloud Platform, showing that even though the scale-up time of containers is much lower than VM, Kubernetes is still vulnerable to the YoYo attack since VMs are still involved. Finally, we evaluate ML models that can accurately detect YoYo attack on a Kubernetes cluster.
KW - Containers
KW - Distributed Denial of Service (DDoS)
KW - Economic Denial of Sustainability (EDoS)
KW - Kubernetes
UR - http://www.scopus.com/inward/record.url?scp=85137578505&partnerID=8YFLogxK
M3 - منشور من مؤتمر
T3 - International Conference on Cloud Computing and Services Science, CLOSER - Proceedings
SP - 34
EP - 44
BT - CLOSER 2021 - Proceedings of the 11th International Conference on Cloud Computing and Services Science
A2 - Helfert, Markus
A2 - Ferguson, Donald
A2 - Pahl, Claus
Y2 - 28 April 2021 through 30 April 2021
ER -