ABSTRACT
Microservice applications have gained significant popularity due to their capability to decrease the complexity of developing highly scalable, manageable, and flexible systems. However, the microservices distributed nature, fine service granularity, and large attack surface introduce new security challenges, making it crucial to develop effective mechanisms for protecting those applications at runtime. Nevertheless, developing novel solutions relies on the availability of suitable datasets, which are currently lacking and need to be generated through new research. This research paper presents a comprehensive framework designed to support research on monitoring and analyzing microservices, aiding in the development of novel solutions for detecting attacks in the context of microservice applications. We present an implementation of the framework for generating data for high- and low-volume Denial of Service (DoS) attacks, highlighting its key components and features. Furthermore, we present a series of attack profiles and evaluate the framework’s performance in a case study, demonstrating the framework’s usefulness for generating data for DoS attacks by presenting a model that successfully detects the attacks.
- Carlos M Aderaldo, Nabor C Mendonça, Claus Pahl, and Pooyan Jamshidi. 2017. Benchmark requirements for microservices architecture research. In 2017 IEEE/ACM 1st International Workshop on Establishing the Community-Wide Infrastructure for Architecture-Based Software Engineering (ECASE). IEEE, 8–13.Google ScholarCross Ref
- Apache Software Foundation. 2022. Apache JMeter. The Apache Software Foundation. https://jmeter.apache.org/Google Scholar
- Ataollah Fatahi Baarzi, George Kesidis, Dan Fleck, and Angelos Stavrou. 2020. Microservices made attack-resilient using unsupervised service fissioning. In Proceedings of the 13th European workshop on Systems Security. 31–36.Google ScholarDigital Library
- Sriyash Caculo, Kanishka Lahiri, and Subramaniam Kalambur. 2020. Characterizing the scale-up performance of microservices using teastore. In 2020 IEEE International Symposium on Workload Characterization (IISWC). IEEE, 48–59.Google ScholarCross Ref
- Clinton Cao, Agathe Blaise, Sicco Verwer, and Filippo Rebecchi. 2022. Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster. In Proceedings of the 17th International Conference on Availability, Reliability and Security. 1–9.Google ScholarDigital Library
- Jessica Castro, Nuno Laranjeiro, and Marco Vieira. 2022. Detecting DoS Attacks in Microservice Applications: Approach and Case Study. In Proceedings of the 11th Latin-American Symposium on Dependable Computing. 73–78.Google ScholarDigital Library
- Jessica Castro, Nuno Laranjeiro, and Marco Vieira. 2023. Exploring Logic Scoring of Preference for DoS Attack Detection in Microservice Applications. In ICWS - International Conference on Web Services.Google Scholar
- Cloud Native Computing Foundation. 2022. Kubernetes. Kubernetes. https://kubernetes.io/Google Scholar
- Qingfeng Du, Tiandi Xie, and Yu He. 2018. Anomaly detection and diagnosis for container-based microservices with performance monitoring. In Algorithms and Architectures for Parallel Processing: 18th International Conference, ICA3PP 2018, Guangzhou, China, November 15-17, 2018, Proceedings, Part IV 18. Springer, 560–572.Google ScholarCross Ref
- Jozo Dujmovic. 2018. Soft computing evaluation logic: The LSP decision method and its applications. John Wiley & Sons.Google Scholar
- Google. 2022. cAdvisor. Google. https://github.com/google/cadvisorGoogle Scholar
- Alexey Grafov. 2016. Hulk. https://github.com/grafov/hulk. Accessed on March 17, 2023.Google Scholar
- Johannes Grohmann, Patrick K Nicholson, Jesus Omana Iglesias, Samuel Kounev, and Diego Lugones. 2019. Monitorless: Predicting performance degradation in cloud applications with machine learning. In Proceedings of the 20th international middleware conference. 149–162.Google ScholarDigital Library
- Wilhelm Hasselbring and André van Hoorn. 2020. Kieker: A monitoring framework for software engineering research. Software Impacts 5 (2020), 100019.Google ScholarCross Ref
- Mohammad Hossin and Md Nasir Sulaiman. 2015. A review on evaluation metrics for data classification evaluations. International journal of data mining & knowledge management process 5, 2 (2015), 1.Google Scholar
- InfluxData Inc. 2023. InfluxDB. https://github.com/influxdata/influxdb.Google Scholar
- InfluxData Inc. 2023. Telegraf. https://github.com/influxdata/telegraf.Google Scholar
- Ghafar A Jaafar, Shahidan M Abdullah, Saifuladli Ismail, 2019. Review of recent detection methods for HTTP DDoS attack. Journal of Computer Networks and Communications 2019 (2019).Google Scholar
- Min Li, Dingyong Tang, Zepeng Wen, and Yunchang Cheng. 2021. Microservice anomaly detection based on tracing data using semi-supervised learning. In 2021 4th International Conference on Artificial Intelligence and Big Data (ICAIBD). IEEE, 38–44.Google ScholarCross Ref
- Modupe Odusami, Sanjay Misra, Olusola Abayomi-Alli, Adebayo Abayomi-Alli, and Luis Fernandez-Sanz. 2020. A survey and meta-analysis of application-layer distributed denial-of-service attack. International Journal of Communication Systems 33, 18 (2020), e4603.Google ScholarCross Ref
- Areeg Samir and Claus Pahl. 2020. Detecting and localizing anomalies in container clusters using Markov models. Electronics 9, 1 (2020), 64.Google ScholarCross Ref
- Solarstone. 2014. Torshammer. https://sourceforge.net/projects/torshammer/. Accessed on March 17, 2023.Google Scholar
- Joakim Von Kistowski, Simon Eismann, Norbert Schmitt, André Bauer, Johannes Grohmann, and Samuel Kounev. 2018. Teastore: A micro-service reference application for benchmarking, modeling and resource management research. In 2018 IEEE 26th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS). IEEE, 223–236.Google ScholarCross Ref
- Lingzhi Wang, Nengwen Zhao, Junjie Chen, Pinnong Li, Wenchi Zhang, and Kaixin Sui. 2020. Root-cause metric location for microservice systems via log anomaly detection. In 2020 IEEE International Conference on Web Services (ICWS). IEEE, 142–150.Google ScholarCross Ref
- Dongjin Yu, Yike Jin, Yuqun Zhang, and Xi Zheng. 2019. A survey on security issues in services communication of Microservices-enabled fog applications. Concurrency and Computation: Practice and Experience 31, 22 (2019), e4436.Google ScholarCross Ref
Index Terms
- Generating Realistic Attack Data for Microservices: Framework and Case Study
Recommendations
Detecting DoS Attacks in Microservice Applications: Approach and Case Study
LADC '22: Proceedings of the 11th Latin-American Symposium on Dependable ComputingA microservices-based architecture decreases the complexity of developing new systems, making them highly scalable and manageable. However, its distributed nature, the high granularity of services, and the large attack surface increase the need to ...
Localized DoS Attack Detection Architecture for Reliable Data Transmission Over Wireless Sensor Network
Due to the scattered nature of WSNs, resource constraints, the radio link for multi-hop communications and their remote area deployment, WSNs are exposed to several security attacks that can affect overall network performance. Therefore, security is the ...
Prevention of DoS Attacks Based on Light Weight Dynamic Key Mechanism in Hierarchical Wireless Sensor Networks
FGCN '08: Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 01Denial of service (DoS) attack is an impelling inside attack in the form of interference or collision at the receiver side, which can causes serious damage to the functions of wireless sensor networks (WSNs). In this paper, we propose a solution using ...
Comments