Skip to main content

Advertisement

Log in

Securing Data Center Against Power Attacks

  • Published:
Journal of Hardware and Systems Security Aims and scope Submit manuscript

Abstract

Modern data centers employ complex and specialized power management architectures in the pursuit of energy and thermal efficiency. Interestingly, this rising complexity has exposed a new attack surface in an already vulnerable environment. In this work, we uncover a potent threat stemming from a compromised power management module in the hypervisor to motivate the need to safeguard the data centers from power attacks. HyperAttackan internal power attack—maliciously increases the data center power consumption by more than 70%, while minimally affecting the service level agreement. We propose a machine learning-based secure architecture, SCALE, to detect anomalous power consumption behavior and prevent against power outages due to HyperAttack escalations. SCALE delivers 99% classification accuracy, with a maximum false positive rate of 3.8%.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Andrae AS, Edler T (2015) On global electricity usage of communication technology: trends to 2030. Challenges 6(1):117–157

    Article  Google Scholar 

  2. Arce I et al (2014) Avoiding the top 10 software security design flaws. Technical report, IEEE Computer Societys Center for Secure Design (CSD)

  3. Barroso LA, Hölzle U (2007) The case for energy-proportional computing. IEEE Computer 40:33–37

    Article  Google Scholar 

  4. Beloglazov A et al (2012) Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Fut Gener Comput Syst 28(5):755–768

    Article  Google Scholar 

  5. Beloglazov A, Buyya R (2012) Optimal online deterministic algorithms and adaptive heuristics for energy and performance efficient dynamic consolidation of virtual machines in cloud data centers. Concurr Comput: Pract Exper 24(13):1397–1420

    Article  Google Scholar 

  6. Ben-Yehuda M et al (2010) The turtles project: design and implementation of nested virtualization. In: USENIX-OSDI, pp 423–436

  7. Brook J et al The treacherous twelve: cloud computing top threats in 2016, Cloud Security Alliance. Retrieved June 15 (2016)

  8. Buyya R et al (2010) Energy-efficient management of data center resources for cloud computing: a vision, architectural elements, and open challenges. arXiv:1006.0308

  9. Calheiros RN et al (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw. Pract. Exper. 41(1): 23–50

    Article  MathSciNet  Google Scholar 

  10. Chan J (2004) Essentials of patch management policy and practice. http://www.patchmanagement.org/pmessentials.asp

  11. Chang C-C, Lin C-J (2011) LIBSVM: A library for support vector machines. ACM Transactions on Intelligent Systems and Technology. Software available at http://www.csie.ntu.edu.tw/cjlin/libsvm

  12. Crosby SA, Wallach DS Denial of service via algorithmic complexity attacks. In: 12th USENIX Security Symposium, USA

  13. David H et al (2011) Memory power management via dynamic voltage/frequency scaling. In: ACM Proceedings on International Conference on Autonomic Computing, pp 31–40

  14. Farahnakian F et al (2014) Energy-efficient virtual machines consolidation in cloud data centers using reinforcement learning. In: 22nd Euromicro International Conference on Parallel, Distributed, and Network-Based Processing, PDP 2014, Torino, Italy, pp 500–507

  15. Fu X et al (2011) How much power oversubscription is safe and allowed in data centers. In: ACM Proceedings on International Conference on Autonomic Computing

  16. Gartner Inc. (2012) Competitive landscape: power management IC and power semiconductor vendors. Gartner Research

  17. Kliazovich D et al (2013) DENS: data center energy-efficient network-aware scheduling. Clust Comput 16 (1):65–75

    Article  Google Scholar 

  18. Kocher P et al (2018) Spectre attacks: exploiting speculative execution. https://meltdownattack.com

  19. Lee Y, Kim S Samsung blames small battery flaw for prompting Note 7 recall. https://www.bloomberg.com/news/articles/2016-09-13/samsung-blames-small-battery-flaw-for-igniting-note-7-recall

  20. Lipp M et al (2018) Meltdown. CoRR arXiv:1801.01207

  21. Mastelic T et al (2015) Cloud computing: survey on energy efficiency. ACM Comput Surv (CSUR) 47(2):33

    Google Scholar 

  22. Mittal S (2014) Power management techniques for data centers: a survey. CoRR arXiv:1404.6681

  23. Nekoogar F (2003) From ASICs to SOCs: a practical approach. Prentice Hall Professional, Englewood Cliffs

    Google Scholar 

  24. Park K, Pai VS (2006) CoMon: A mostly-scalable monitoring system for PlanetLab. SIGOPS

  25. Reserach P (2011) PC And server power management software. Tech. rep.

  26. Rich S Battery failure, human error still cause most data center outages. http://www.govtech.com/data/224102581.html

  27. Ryan MD (2013) Cloud computing security the scientific challenge, and a survey of solutions. J Syst Softw 86(9):2263–2268

    Article  Google Scholar 

  28. Sasso M (2016) Delta pegs loss from computer breakdown at $100 million. http://www.dallasnews.com/business/airline-industry/20160902-delta-pegs-loss-from-computer-breakdown-at-100-million

  29. Scholkopf B et al (2001) Estimating the support of a high-dimensional distribution. Journal on Neural Computing 13(7):1443–1471

    Article  Google Scholar 

  30. Sverdlik Y Verizon data center outage delays JetBlue flights. http://www.datacenterknowledge.com/archives/2016/01/14/verizon-data-center-outage-delays-jetblue-flights/

  31. Tan C et al (2012) Tinychecker: transparent protection of VMS against hypervisor failures with nested virtualization. In: IEEE/IFIP International Conference on DSN. IEEE, pp 1–6

  32. TechNavio (2013) Global PC and server power management Software Market. Tech. rep.

  33. Tehranipoor M, Koushanfar F (2010) A survey of hardware trojan taxonomy and detection. IEEE Des Test Comput 27(1):10–25

    Article  Google Scholar 

  34. Wu Z et al (2011) Energy attack on server systems. In: USENIX Technical Conference, pp 62–70

  35. Xu Z et al (2014) Power attack: an increasing threat to data centers. In: 21St annual NDSS symposium, USA

  36. HP Power Manager User Guide https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-c01272419

  37. HP Power Manager Vulnerability CVE-2011-0280 https://nvd.nist.gov/vuln/detail/CVE-2011-0280

  38. HP Power Manager Vulnerability CVE-2010-4113 https://nvd.nist.gov/vuln/detail/CVE-2010-4113

  39. Intel Power Management Controller Firmware Vulnerability CVE-2018-3643 https://nvd.nist.gov/vuln/detail/CVE-2018-3643

  40. Gao X et al (2018) Reduced cooling redundancy: a new security vulnerability in a hot data center. In: Proceedings of the network and distributed system security symposium

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajesh JS.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

JS, R., Rajamanikkam, C., Chakraborty, K. et al. Securing Data Center Against Power Attacks. J Hardw Syst Secur 3, 177–188 (2019). https://doi.org/10.1007/s41635-019-0064-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s41635-019-0064-7

Keywords

Navigation