A new colluded adversarial VNet embeddings attack in cloud

I. Hsien Liu, Tay Jiun Fang, Jung Shian Li, Meng Wei Sun, Chuan Gang Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Nowadays, network virtualization has been widely investigated in order to prevent Internet ossification, and develop future emerging network applications flexibly. However, prior work by Pignolet et al. shows the possible attacking methodology with which the attackers can disclose the whole cloud topology while deploying virtual networks in cloud named Topology Disclosure Attack. In this attack model, the attacker pretends to deploy virtual networks in cloud by issuing the graph requests to service provider. And the service provider responds the requests to the attacker after examining his/her topology resources. With this request/reply model, Pignolet et al. believe this attack eventually infers the targeted topology. However, one vital reason leads this attack to the failure- too many virtual requests from one adversary in a time. This paper tries to provide a new topology disclosure attack model, which multiple attackers launch attacks at the same time with the assistance of proposed Query-Trie and network tomography technique. Hence, in this paper, we propose much more possible attack model in cloud and this topic also encourages the network researchers to develop resistance mechanism against it in the future.

Original languageEnglish
Title of host publicationProceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017
EditorsShi-Jinn Horng
PublisherIEEE Computer Society
Pages9-16
Number of pages8
ISBN (Electronic)9781538631515
DOIs
Publication statusPublished - 2018 Mar 27
Event18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017 - Taipei, Taiwan
Duration: 2017 Dec 182017 Dec 20

Publication series

NameParallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings
Volume2017-December

Other

Other18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017
CountryTaiwan
CityTaipei
Period17-12-1817-12-20

Fingerprint

Attack
Topology
Disclosure
Tomography
Virtualization
Multiple Models
Internet
Model
Query
Resources
Methodology
Graph in graph theory

All Science Journal Classification (ASJC) codes

  • Software
  • Hardware and Architecture
  • Theoretical Computer Science
  • Computer Science Applications

Cite this

Liu, I. H., Fang, T. J., Li, J. S., Sun, M. W., & Liu, C. G. (2018). A new colluded adversarial VNet embeddings attack in cloud. In S-J. Horng (Ed.), Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017 (pp. 9-16). (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; Vol. 2017-December). IEEE Computer Society. https://doi.org/10.1109/PDCAT.2017.00012
Liu, I. Hsien ; Fang, Tay Jiun ; Li, Jung Shian ; Sun, Meng Wei ; Liu, Chuan Gang. / A new colluded adversarial VNet embeddings attack in cloud. Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017. editor / Shi-Jinn Horng. IEEE Computer Society, 2018. pp. 9-16 (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings).
@inproceedings{969ccaf17d504e1e8906efb976dcab9d,
title = "A new colluded adversarial VNet embeddings attack in cloud",
abstract = "Nowadays, network virtualization has been widely investigated in order to prevent Internet ossification, and develop future emerging network applications flexibly. However, prior work by Pignolet et al. shows the possible attacking methodology with which the attackers can disclose the whole cloud topology while deploying virtual networks in cloud named Topology Disclosure Attack. In this attack model, the attacker pretends to deploy virtual networks in cloud by issuing the graph requests to service provider. And the service provider responds the requests to the attacker after examining his/her topology resources. With this request/reply model, Pignolet et al. believe this attack eventually infers the targeted topology. However, one vital reason leads this attack to the failure- too many virtual requests from one adversary in a time. This paper tries to provide a new topology disclosure attack model, which multiple attackers launch attacks at the same time with the assistance of proposed Query-Trie and network tomography technique. Hence, in this paper, we propose much more possible attack model in cloud and this topic also encourages the network researchers to develop resistance mechanism against it in the future.",
author = "Liu, {I. Hsien} and Fang, {Tay Jiun} and Li, {Jung Shian} and Sun, {Meng Wei} and Liu, {Chuan Gang}",
year = "2018",
month = "3",
day = "27",
doi = "10.1109/PDCAT.2017.00012",
language = "English",
series = "Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings",
publisher = "IEEE Computer Society",
pages = "9--16",
editor = "Shi-Jinn Horng",
booktitle = "Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017",
address = "United States",

}

Liu, IH, Fang, TJ, Li, JS, Sun, MW & Liu, CG 2018, A new colluded adversarial VNet embeddings attack in cloud. in S-J Horng (ed.), Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017. Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings, vol. 2017-December, IEEE Computer Society, pp. 9-16, 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017, Taipei, Taiwan, 17-12-18. https://doi.org/10.1109/PDCAT.2017.00012

A new colluded adversarial VNet embeddings attack in cloud. / Liu, I. Hsien; Fang, Tay Jiun; Li, Jung Shian; Sun, Meng Wei; Liu, Chuan Gang.

Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017. ed. / Shi-Jinn Horng. IEEE Computer Society, 2018. p. 9-16 (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings; Vol. 2017-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - A new colluded adversarial VNet embeddings attack in cloud

AU - Liu, I. Hsien

AU - Fang, Tay Jiun

AU - Li, Jung Shian

AU - Sun, Meng Wei

AU - Liu, Chuan Gang

PY - 2018/3/27

Y1 - 2018/3/27

N2 - Nowadays, network virtualization has been widely investigated in order to prevent Internet ossification, and develop future emerging network applications flexibly. However, prior work by Pignolet et al. shows the possible attacking methodology with which the attackers can disclose the whole cloud topology while deploying virtual networks in cloud named Topology Disclosure Attack. In this attack model, the attacker pretends to deploy virtual networks in cloud by issuing the graph requests to service provider. And the service provider responds the requests to the attacker after examining his/her topology resources. With this request/reply model, Pignolet et al. believe this attack eventually infers the targeted topology. However, one vital reason leads this attack to the failure- too many virtual requests from one adversary in a time. This paper tries to provide a new topology disclosure attack model, which multiple attackers launch attacks at the same time with the assistance of proposed Query-Trie and network tomography technique. Hence, in this paper, we propose much more possible attack model in cloud and this topic also encourages the network researchers to develop resistance mechanism against it in the future.

AB - Nowadays, network virtualization has been widely investigated in order to prevent Internet ossification, and develop future emerging network applications flexibly. However, prior work by Pignolet et al. shows the possible attacking methodology with which the attackers can disclose the whole cloud topology while deploying virtual networks in cloud named Topology Disclosure Attack. In this attack model, the attacker pretends to deploy virtual networks in cloud by issuing the graph requests to service provider. And the service provider responds the requests to the attacker after examining his/her topology resources. With this request/reply model, Pignolet et al. believe this attack eventually infers the targeted topology. However, one vital reason leads this attack to the failure- too many virtual requests from one adversary in a time. This paper tries to provide a new topology disclosure attack model, which multiple attackers launch attacks at the same time with the assistance of proposed Query-Trie and network tomography technique. Hence, in this paper, we propose much more possible attack model in cloud and this topic also encourages the network researchers to develop resistance mechanism against it in the future.

UR - http://www.scopus.com/inward/record.url?scp=85046778357&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85046778357&partnerID=8YFLogxK

U2 - 10.1109/PDCAT.2017.00012

DO - 10.1109/PDCAT.2017.00012

M3 - Conference contribution

AN - SCOPUS:85046778357

T3 - Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings

SP - 9

EP - 16

BT - Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017

A2 - Horng, Shi-Jinn

PB - IEEE Computer Society

ER -

Liu IH, Fang TJ, Li JS, Sun MW, Liu CG. A new colluded adversarial VNet embeddings attack in cloud. In Horng S-J, editor, Proceedings - 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2017. IEEE Computer Society. 2018. p. 9-16. (Parallel and Distributed Computing, Applications and Technologies, PDCAT Proceedings). https://doi.org/10.1109/PDCAT.2017.00012