skip to main content
10.1145/3589608.3594742acmconferencesArticle/Chapter ViewAbstractPublication PagessacmatConference Proceedingsconference-collections
short-paper
Open Access

Sidecar-based Path-aware Security for Microservices

Published:24 May 2023Publication History

ABSTRACT

Microservice architectures decompose web applications into loosely-coupled, distributed components that interact with each other to provide an overall service. While this popular software architecture paradigm has many advantages in development and deployment, it also introduces a wider attack surface that is vulnerable to both internal and external attackers. Potentially malicious third-party services or software packages, as well as increased communication endpoints, introduce a wide array of security concerns. To improve the resiliency of microservice-based applications, many of which store sensitive data, we propose a novel, path-based anomaly detection and access control infrastructure that requires no modifications to existing software. We propose leveraging trusted proxies deployed alongside each service for request inspection, anomaly detection and signed token propagation for end-user path validation. Our approach reduces the trusted computing base away from the microservices to a smaller set of components that allow for less trust and a smaller attack surface.

References

  1. Rabe Abdalkareem, Olivier Nourry, Sultan Wehaibi, Suhaib Mujahid, and Emad Shihab. 2017. Why do developers use trivial packages? an empirical case study on npm. In Proceedings of the 2017 11th joint meeting on foundations of software engineering. ACM, New York, NY, 385--395.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Lee Calcote and Zack Butcher. 2019. Istio: Up and running: Using a service mesh to connect, secure, control, and observe. O'Reilly Media.Google ScholarGoogle Scholar
  3. Ramaswamy Chandramouli. 2019. Microservices-based application systems. NIST Special Publication 800, 204 (2019), 800--204.Google ScholarGoogle Scholar
  4. Binildas Christudas. 2019. Practical Microservices Architectural Patterns: Event- Based Java Microservices with Spring Boot and Spring Cloud. Apress.Google ScholarGoogle Scholar
  5. Nishu Dissanayake. 2021. Handling Cross-Cutting Concerns in Microservices: The Sidecar Pattern. https://blog.bitsrc.io/handling-cross-cutting-concerns-in- microservices-the-sidecar\-pattern-59890fe3dc0f. Accessed: March 21, 2023.Google ScholarGoogle Scholar
  6. Nicola Dragoni, Saverio Giallorenzo, Alberto Lluch Lafuente, Manuel Mazzara, Fabrizio Montesi, Ruslan Mustafin, and Larisa Safina. 2017. Microservices: yes- terday, today, and tomorrow. Present and ulterior software engineering (2017), 195--216.Google ScholarGoogle Scholar
  7. Envoy Proxy 2023. Envoy Proxy - Home. https://www.envoyproxy.io/. (Accessed on 02/10/2023).Google ScholarGoogle Scholar
  8. ESLint 2018. ESLint. https://eslint.org/blog/2018/07/postmortem-for-malicious- package-publishes/Google ScholarGoogle Scholar
  9. Pronnoy Goswami, Saksham Gupta, Zhiyuan Li, Na Meng, and Daphne Yao. 2020. Investigating the reproducibility of npm packages. In 2020 IEEE International Con- ference on Software Maintenance and Evolution (ICSME). IEEE, Adelaide, Australia, 677--681.Google ScholarGoogle Scholar
  10. Ronen Heled. 2005. HTTP REQUEST SMUGGLING.Google ScholarGoogle Scholar
  11. Bahruz Jabiyev, Omid Mirzaei, Amin Kharraz, and Engin Kirda. 2021. Preventing server-side request forgery attacks. In Proceedings of the 36th Annual ACM Symposium on Applied Computing. ACM, Virtual Conference, Republic of Korea, 1626--1635.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Yizhen Jia, Yinhao Xiao, Jiguo Yu, Xiuzhen Cheng, Zhenkai Liang, and Zhiguo Wan. 2018. A novel graph-based mechanism for identifying traffic vulnerabilities in smart home IoT. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, Honolulu, HI, 1493--1501.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Igibek Koishybayev and Alexandros Kapravelos. 2020. Mininode: Reducing the Attack Surface of Node.js Applications. In 23rd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2020). USENIX Association, San Sebastian, 121--134. https://www.usenix.org/conference/raid2020/presentation/ koishybayevGoogle ScholarGoogle Scholar
  14. Markus Legner, Tobias Klenze, Marc Wyss, Christoph Sprenger, and Adrian Perrig. 2020. EPIC: Every packet is checked in the data plane of a path-aware Internet. In Proceedings of the 29th USENIX Conference on Security Symposium. 541--558.Google ScholarGoogle Scholar
  15. Tim McLean. 2020. Critical vulnerabilities in JSON Web Token libraries. https:// auth0.com/blog/critical-vulnerabilities-in-json-web-token-libraries/. (Accessed on 02/16/2023).Google ScholarGoogle Scholar
  16. Sam Newman. 2021. Building microservices. "O'Reilly Media, Inc.".Google ScholarGoogle Scholar
  17. Hoai Viet Nguyen, Luigi Lo Iacono, and Hannes Federrath. 2019. Your cache has fallen: Cache-poisoned denial-of-service attack. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, London, United Kingdom, 1915--1936.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Christoforos Ntantogian, Panagiotis Bountakas, Dimitris Antonaropoulos, Con- stantinos Patsakis, and Christos Xenakis. 2021. NodeXP: NOde. js server-side JavaScript injection vulnerability DEtection and eXPloitation. Journal of Information Security and Applications 58 (2021), 102752.Google ScholarGoogle ScholarCross RefCross Ref
  19. Marc-Oliver Pahl and François-Xavier Aubet. 2018. All eyes on you: Distributed Multi-Dimensional IoT microservice anomaly detection. In 2018 14th International Conference on Network and Service Management (CNSM). IEEE, Rome, Italy, 72--80.Google ScholarGoogle Scholar
  20. Marc-Oliver Pahl, François-Xavier Aubet, and Stefan Liebald. 2018. Graph-based IoT microservice security. In NOMS 2018--2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, Taipei, Taiwan, 1--3.Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Marc-Oliver Pahl and Lorenzo Donini. 2018. Securing IoT microservices with certificates. In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, Taipei, Taiwan, 1--5.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Cesare Pautasso, Olaf Zimmermann, Mike Amundsen, James Lewis, and Nicolai Josuttis. 2017. Microservices in practice, part 1: Reality check and service design. IEEE software 34, 01 (2017), 91--98.Google ScholarGoogle Scholar
  23. Joshua H Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N Brown, and Gedare Bloom. 2022. Poster: Toward Zero-Trust Path-Aware Access Control. In Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies. 267--269.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Ekaterina Shmeleva et al. 2020. How Microservices are Changing the Security Landscape. Aalto University, Espoo, Finland.Google ScholarGoogle Scholar
  25. Usage Statistics and Market Share of Node.js [n. d.]. Usage Statistics and Market Share of Node.js, February 2023. https://w3techs.com/technologies/details/ws-nodejs. (Accessed on 02/14/2023).Google ScholarGoogle Scholar
  26. Erik Wittern, Philippe Suter, and Shriram Rajagopalan. 2016. A look at the dynam- ics of the JavaScript package ecosystem. In Proceedings of the 13th International Conference on Mining Software Repositories. ACM, Austin, Texas, 351--361.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Sidecar-based Path-aware Security for Microservices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies
            May 2023
            218 pages
            ISBN:9798400701733
            DOI:10.1145/3589608

            Copyright © 2023 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 24 May 2023

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            Overall Acceptance Rate177of597submissions,30%
          • Article Metrics

            • Downloads (Last 12 months)415
            • Downloads (Last 6 weeks)35

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader