Poster: More is Less Denial-of-Service Attacks and Solutions in Many-Core On-Chip Networks
نویسندگان
چکیده
A many-core system is expected to outperform a traditional single-core system by enabling multiple applications to be executed on separate cores in parallel, given the generous assumption that the execution of an application on one core does not interfere with an application on other cores. Regrettably, this optimistic belief about independence of different applications turns out widely untrue in practice. Interdependencies and contention between cores abound in manycore systems, most prominently caused by a set of shared resources, ranging from on-chip networks, shared memories/disks, to controller buffers etc. The existence of such shared resources lends a great help to Denial-of-Service (DoS) attacks: a greedy application can immoderately engulf certain share resource, depriving other applications of gaining fair access to that shared resource. On-chip networks are one of the critical shared resources in future many-core systems. An on-chip network connects tens to hundreds of components (CPUs, caches, memory controllers, accelerators, etc) via on-chip routers, executing hundreds of tasks concurrently. For example, Tilera already has a 100-node on-chip network organized as a 10x10 mesh [1]. Figure 1 depicts an example 3x3 mesh on-chip network. Although DoS attacks and countermeasures have been extensively studied in the context of computer networks, DoS attacks on emerging on-chip networks are barely recognized by the security community. As one of very few exceptions, Moscibroda and Mutlu propose, implement, and prevent an on-chip DoS attack against shared memories [7]. However, their work does not consider on-chip networks. Due to substantial differences between computer networks and on-chip networks, solutions for computer networks cannot be transplanted to on-chip networks either. Because on-chip networks are implemented in hardware, any on-chip network mechanism needs to be simple, easy-to-implement, and energyefficient. This poster intends to raise the awareness of DoS attacks for on-chip networks among the security community. More specifically, our contribution is three-fold. (i) First, we bring forth this important problem from a security point of view, and formalize the attack model and security definition. (ii) Second, we simulate effective DoS attacks which successfully overload a node of an on-chip network. (iii) Third, we review the state-of-art mechanisms and propose possible solutions.
منابع مشابه
HF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملIntrusion Detection in IOT based Networks Using Double Discriminant Analysis
Intrusion detection is one of the main challenges in wireless systems especially in Internet of things (IOT) based networks. There are various attack types such as probe, denial of service, remote to local and user to root. In addition to known attacks and malicious behaviors, there are various unknown attacks that some of them have similar behavior with respect to each other or mimic the norma...
متن کاملDetecting Denial of Service Message Flooding Attacks in SIP based Services
Increasing the popularity of SIP based services (VoIP, IPTV, IMS infrastructure) lead to concerns about its security. The main signaling protocol of next generation networks and VoIP systems is Session Initiation Protocol (SIP). Inherent vulnerabilities of SIP, misconfiguration of its related components and also its implementation deficiencies cause some security concerns in SIP based infra...
متن کاملEvaluation of an Intrusion Detection System for Routing Attacks in Wireless Self-organised Networks
Wireless Sensor Networks (WSNs) arebecoming increasingly popular, and very useful in militaryapplications and environmental monitoring. However,security is a major challenge for WSNs because they areusually setup in unprotected environments. Our goal in thisstudy is to simulate an Intrusion Detection System (IDS)that monitors the WSN and report intrusions accurately andeffectively. We have thus...
متن کاملSecureNoC: Enhancing On-Chip Network Security for Many Integrated Core Systems
With the unimpeded scaling of transistor technology, multiprocessors with a large number of integrated cores on a single die are emerging as efficient and practical solutions for the warehouse-scale computing and datacenter markets. Enabling scalable data communication between such cores is a challenge. Networks on Chip (NoCs) have emerged as the most promising and readily implementable solutio...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010