Abstract
Modern data centers employ complex and specialized power management architectures in the pursuit of energy and thermal efficiency. Interestingly, this rising complexity has exposed a new attack surface in an already vulnerable environment. In this work, we uncover a potent threat stemming from a compromised power management module in the hypervisor to motivate the need to safeguard the data centers from power attacks. HyperAttack—an internal power attack—maliciously increases the data center power consumption by more than 70%, while minimally affecting the service level agreement. We propose a machine learning-based secure architecture, SCALE, to detect anomalous power consumption behavior and prevent against power outages due to HyperAttack escalations. SCALE delivers 99% classification accuracy, with a maximum false positive rate of 3.8%.











Similar content being viewed by others
References
Andrae AS, Edler T (2015) On global electricity usage of communication technology: trends to 2030. Challenges 6(1):117–157
Arce I et al (2014) Avoiding the top 10 software security design flaws. Technical report, IEEE Computer Societys Center for Secure Design (CSD)
Barroso LA, Hölzle U (2007) The case for energy-proportional computing. IEEE Computer 40:33–37
Beloglazov A et al (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Fut Gener Comput Syst 28(5):755–768
Beloglazov A, Buyya R (2012) Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurr Comput: Pract Exper 24(13):1397–1420
Ben-Yehuda M et al (2010) The turtles project: design and implementation of nested virtualization. In: USENIX-OSDI, pp 423–436
Brook J et al The treacherous twelve: cloud computing top threats in 2016, Cloud Security Alliance. Retrieved June 15 (2016)
Buyya R et al (2010) Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges. arXiv:1006.0308
Calheiros RN et al (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exper. 41(1): 23–50
Chan J (2004) Essentials of patch management policy and practice. http://www.patchmanagement.org/pmessentials.asp
Chang C-C, Lin C-J (2011) LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology. Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm
Crosby SA, Wallach DS Denial of service via algorithmic complexity attacks. In: 12th USENIX Security Symposium, USA
David H et al (2011) Memory power management via dynamic voltage/frequency scaling. In: ACM Proceedings on International Conference on Autonomic Computing, pp 31–40
Farahnakian F et al (2014) Energy-efficient virtual machines consolidation in cloud data centers using reinforcement learning. In: 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014, Torino, Italy, pp 500–507
Fu X et al (2011) How much power oversubscription is safe and allowed in data centers. In: ACM Proceedings on International Conference on Autonomic Computing
Gartner Inc. (2012) Competitive landscape: power management IC and power semiconductor vendors. Gartner Research
Kliazovich D et al (2013) DENS: data center energy-efficient network-aware scheduling. Clust Comput 16 (1):65–75
Kocher P et al (2018) Spectre attacks: exploiting speculative execution. https://meltdownattack.com
Lee Y, Kim S Samsung blames small battery flaw for prompting Note 7 recall. https://www.bloomberg.com/news/articles/2016-09-13/samsung-blames-small-battery-flaw-for-igniting-note-7-recall
Lipp M et al (2018) Meltdown. CoRR arXiv:1801.01207
Mastelic T et al (2015) Cloud computing: survey on energy efficiency. ACM Comput Surv (CSUR) 47(2):33
Mittal S (2014) Power management techniques for data centers: a survey. CoRR arXiv:1404.6681
Nekoogar F (2003) From ASICs to SOCs: a practical approach. Prentice Hall Professional, Englewood Cliffs
Park K, Pai VS (2006) CoMon: A mostly-scalable monitoring system for PlanetLab. SIGOPS
Reserach P (2011) PC And server power management software. Tech. rep.
Rich S Battery failure, human error still cause most data center outages. http://www.govtech.com/data/224102581.html
Ryan MD (2013) Cloud computing security the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268
Sasso M (2016) Delta pegs loss from computer breakdown at $100 million. http://www.dallasnews.com/business/airline-industry/20160902-delta-pegs-loss-from-computer-breakdown-at-100-million
Scholkopf B et al (2001) Estimating the support of a high-dimensional distribution. Journal on Neural Computing 13(7):1443–1471
Sverdlik Y Verizon data center outage delays JetBlue flights. http://www.datacenterknowledge.com/archives/2016/01/14/verizon-data-center-outage-delays-jetblue-flights/
Tan C et al (2012) Tinychecker: transparent protection of VMS against hypervisor failures with nested virtualization. In: IEEE/IFIP International Conference on DSN. IEEE, pp 1–6
TechNavio (2013) Global PC and server power management Software Market. Tech. rep.
Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25
Wu Z et al (2011) Energy attack on server systems. In: USENIX Technical Conference, pp 62–70
Xu Z et al (2014) Power attack: an increasing threat to data centers. In: 21St annual NDSS symposium, USA
HP Power Manager User Guide https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c01272419
HP Power Manager Vulnerability CVE-2011-0280 https://nvd.nist.gov/vuln/detail/CVE-2011-0280
HP Power Manager Vulnerability CVE-2010-4113 https://nvd.nist.gov/vuln/detail/CVE-2010-4113
Intel Power Management Controller Firmware Vulnerability CVE-2018-3643 https://nvd.nist.gov/vuln/detail/CVE-2018-3643
Gao X et al (2018) Reduced cooling redundancy: a new security vulnerability in a hot data center. In: Proceedings of the network and distributed system security symposium
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
JS, R., Rajamanikkam, C., Chakraborty, K. et al. Securing Data Center Against Power Attacks. J Hardw Syst Secur 3, 177–188 (2019). https://doi.org/10.1007/s41635-019-0064-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s41635-019-0064-7