Microservice Security Framework for IoT by Mimic Defense Mechanism
Abstract
:1. Introduction
- 1.
- We propose a novel container image security framework to proactively defend against continuous attacks from unknown vulnerabilities;
- 2.
- We propose a novel graph structure to maximize the randomness and heterogeneity for the image group transformation, which enhances the ability of our framework to resist continuous unknown attacks;
- 3.
- A prototype is developed using Kubernetes and the experimental results show that our framework can achieve a better active defense power to defend against random attacks, and increases the defence success rate by around over the baseline framework to avoid the continuous unknown attacks.
2. Related Works
2.1. Containerized Technology in IoT
2.2. Microservice Security Defense Methods
2.3. Active Security Defense Method
3. Mimic-Defense-Based Microservice Security Framework
3.1. MDSF Overall Architecture
3.2. Heterogeneous Resource Manager
3.2.1. Mimic Layer Set
3.2.2. Mimic Image Pool
3.3. Mimic Defender
3.3.1. Request handler
3.3.2. Mimic Controller
3.3.3. Mimic Image Scheduler
3.4. The Workflow of MDSF
3.5. MDSF Schedule Strategy
3.5.1. Notations and Definitions
Algorithm 1 Mimic transformation graph generation. |
|
3.5.2. Graph-Based Scheduling Strategy
- 1.
- The new SIG should be far away from the original SIG (heterogeneity).
- 2.
- Each image in SIG should be selected with equal probability from a mimic image pool (randomness).
Algorithm 2 Generate the mimic transformation sequence. |
|
4. Implementation and Experimental Result
4.1. Implementation
4.2. Experimental Design
4.3. Experimental Results
4.3.1. Study of the Randomness Attack
4.3.2. Study of the Continuous Attack
4.3.3. Study of the System Performance
5. Limitation Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Bhowmik, S.; Bhanu, S.M.S.; Rajendran, B. Container Based On-Premises Cloud Security Framework. In Proceedings of the 2020 International Conference on Inventive Computation Technologies (ICICT), Coimbatore, India, 26–28 February 2020; pp. 773–778. [Google Scholar]
- Wang, J.; Cao, J.; Wang, S.; Yao, Z.; Li, W. IRDA: Incremental reinforcement learning for dynamic resource allocation. IEEE Trans. Big Data 2020. [Google Scholar] [CrossRef]
- Wang, J.; Cao, J.; Stojmenovic, M.; Zhao, M.; Chen, J.; Jiang, S. Pattern-rl: Multi-robot cooperative pattern formation via deep reinforcement learning. In Proceedings of the 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA), Boca Raton, Florida, USA, 16–19 December 2019; pp. 210–215. [Google Scholar]
- Kehrer, S.; Riebandt, F.; Blochinger, W. Container-based module isolation for cloud services. In Proceedings of the 2019 IEEE International Conference on Service-Oriented System Engineering (SOSE), San Francisco, CA, USA, 4–9 April 2019; pp. 177–17709. [Google Scholar]
- Driss, M.; Hasan, D.; Boulila, W.; Ahmad, J. Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions. arXiv 2021, arXiv:2105.07722. [Google Scholar] [CrossRef]
- Hosseinzadeh, S.; Laurén, S.; Leppänen, V. Security in container-based virtualization through vTPM. In Proceedings of the 9th International Conference on Utility and Cloud Computing, Shanghai, China, 6–9 December 2016; pp. 214–219. [Google Scholar]
- Xie, X.; Huang, T.; Guo, Z. Research on the security protection scheme for container-based cloud platform node based on blockchain technology. In Proceedings of the 2018 International Conference of Pioneering Computer Scientists, Engineers and Educators, Zhengzhou, China, 21–23 September 2018; Springer: Singapore; pp. 24–32.
- Rufino, J.; Alam, M.; Ferreira, J.; Rehman, A.; Tsang, K.F. Orchestration of containerized microservices for IIoT using Docker. In Proceedings of the 2017 IEEE International Conference on Industrial Technology (ICIT), Toronto, ON, Canada, 22–25 March 2017; pp. 1532–1536. [Google Scholar]
- Khanda, K.; Salikhov, D.; Gusmanov, K.; Mazzara, M.; Mavridis, N. Microservice-based iot for smart buildings. In Proceedings of the 2017 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA), New Taipei City, Tawan, 27–29 March 2017; pp. 302–308. [Google Scholar]
- Morabito, R.; Petrolo, R.; Loscrí, V.; Mitton, N. Enabling a lightweight Edge Gateway-as-a-Service for the Internet of Things. In Proceedings of the 2016 7th International Conference on the Network of the Future (NOF), Buzios, Brazil, 16–18 November 2016; pp. 1–5. [Google Scholar]
- Ismail, B.I.; Goortani, E.M.; Ab Karim, M.B.; Tat, W.M.; Setapa, S.; Luke, J.Y.; Hoe, O.H. Evaluation of docker as edge computing platform. In Proceedings of the 2015 IEEE Conference on Open Systems (ICOS), Melaka, Malaysia, 24–26 August 2015; pp. 130–135. [Google Scholar]
- Yao, Y.; Chang, V. Towards trust and trust building in a selected cloud gaming virtual community. Int. J. Organ. Collect. Intell. (IJOCI) 2014, 4, 64–86. [Google Scholar] [CrossRef] [Green Version]
- Xu, Q.; Jin, C.; Rasid, M.F.B.M.; Veeravalli, B.; Aung, K.M.M. Blockchain-based decentralized content trust for docker images. Multimed. Tools Appl. 2018, 77, 18223–18248. [Google Scholar] [CrossRef]
- Al Nafea, R.; Almaiah, M.A. Cyber security threats in cloud: Literature review. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 779–786. [Google Scholar]
- Mandal, S.; Khan, D.A. A Study of security threats in cloud: Passive impact of COVID-19 pandemic. In Proceedings of the 2020 International Conference on Smart Electronics and Communication (ICOSEC), Trichy, India, 10–12 September 2020; pp. 837–842. [Google Scholar]
- Combe, T.; Martin, A.; Di Pietro, R. To docker or not to docker: A security perspective. IEEE Cloud Comput. 2016, 3, 54–62. [Google Scholar] [CrossRef]
- Bui, T. Analysis of docker security. arXiv 2015, arXiv:1501.02967. [Google Scholar]
- Sultan, S.; Ahmad, I.; Dimitriou, T. Container security: Issues, challenges, and the road ahead. IEEE Access 2019, 7, 52976–52996. [Google Scholar] [CrossRef]
- Shu, R.; Gu, X.; Enck, W. A study of security vulnerabilities on docker hub. In Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, Scottsdale, AZ, USA, 22–24 March 2017; pp. 269–280. [Google Scholar]
- Grandison, T.; Sloman, M. Trust management tools for internet applications. In Proceedings of the 2003 1st International Conference on Trust Management, Heraklion, Crete, Greece, 28–30 May 2003; Springer: Berlin/Heidelberg, Germany, 2003; pp. 91–107. [Google Scholar]
- Flauzac, O.; Mauhourat, F.; Nolot, F. A review of native container security for running applications. Procedia Comput. Sci. 2020, 175, 157–164. [Google Scholar] [CrossRef]
- Brady, K.; Moon, S.; Nguyen, T.; Coffman, J. Docker container security in cloud computing. In Proceedings of the 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 975–980. [Google Scholar]
- Kritikos, K.; Papoutsakis, M.; Ioannidis, S.; Magoutis, K. Towards Configurable Vulnerability Assessment in the Cloud. In Proceedings of the 2019 IEEE 24th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), Limassol, Cyprus, 11–13 September 2019; pp. 1–6. [Google Scholar]
- Akashe, V.; Neupane, R.L.; Alarcon, M.L.; Wang, S.; Calyam, P. Network-based Active Defense for Securing Cloud-based Healthcare Data Processing Pipelines. In Proceedings of the 2021 International Conference on Computer Communications and Networks (ICCCN), Athens, Greece, 19–22 July 2021; pp. 1–9. [Google Scholar]
- Duncan, A.; Creese, S.; Goldsmith, M. An overview of insider attacks in cloud computing. Concurr. Comput. Pract. Exp. 2015, 27, 2964–2981. [Google Scholar] [CrossRef]
- Jingbo, Z. Research on Application of Network Active Defense Technology in Database Security Service. Value Eng. 2017, 36, 178–179. [Google Scholar]
- Jie, H. Research on key technologies of short-range wireless access for internet of things applications. Electron. Des. Eng. 2019, 27, 88–91. [Google Scholar] [CrossRef]
- Li, F.; Zhang, K.; Chen, S.; Yang, H.; Wang, B. Research on Key Technologies of Active Defense for Distribution Internet of Things Service Security. In Proceedings of the 2020 IEEE International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA), Chongqing, China, 6–8 November 2020; Volume 1, pp. 676–679. [Google Scholar] [CrossRef]
- Wu, J. Cyberspace Mimic Defense; Springer Nature: Cham, Switzerland, 2020. [Google Scholar]
- Chong, F.; Lee, R.; Acquisti, A.; Horne, W.; Palmer, C.; Ghosh, A.; Pendarakis, D.; Sanders, W.; Fleischman, E.; Teufel, H., III; et al. National Cyber Leap Year Summit 2009: Co-Chairs’ Report. In Proceedings of the NITRD Program, Arlington, VA, USA, 17–19 August 2009. [Google Scholar]
- Alavizadeh, H.; Hong, J.B.; Jang-Jaccard, J.; Kim, D.S. Comprehensive Security Assessment of Combined MTD Techniques for the Cloud. In Proceedings of the 5th ACM Workshop on Moving Target Defense, Toronto, Canada, 15 October 2018; Association for Computing Machinery: New York, NY, USA, 2018; pp. 11–20. [Google Scholar]
- Bardas, A.G.; Sundaramurthy, S.C.; Ou, X.; DeLoach, S.A. MTD CBITS: Moving target defense for cloud-based IT systems. In Proceedings of the 2017 22nd European Symposium on Research in Computer Security, Oslo, Norway, 11–15 September 2017; Springer: Cham, Switzerland, 2017; pp. 167–186. [Google Scholar]
- Guo, W.; Wu, Z.; Zhang, F.; Wu, J. Scheduling sequence control method based on sliding window in cyberspace mimic defense. IEEE Access 2019, 8, 1517–1533. [Google Scholar] [CrossRef]
- Ma, B.; Zhang, Z. Security research of redundancy in mimic defense system. In Proceedings of the 2017 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, 13–16 December 2017; pp. 2910–2914. [Google Scholar] [CrossRef]
- Tong, Q.; Zhang, Z.; Zhang, W.; Wu, J. Design and implementation of mimic defense Web server. J. Softw. 2017, 28, 883–897. [Google Scholar]
- Hailong, M.; Peng, Y.; Yiming, J.; Lei, H. Dynamic heterogeneous redundancy based router architecture with mimic defenses. J. Cyber Secur. 2017, 2, 29–42. [Google Scholar]
- Conrad, E.; Misenar, S.; Feldman, J. (Eds.) Chapter 4—Domain 3: Security Engineering (Engineering and Management of Security). In CISSP Study Guide, 3rd ed.; Syngress: Boston, MA, USA, 2016; pp. 103–217. [Google Scholar] [CrossRef]
- Medel, V.; Rana, O.; Bañares, J.Á.; Arronategui, U. Modelling performance & resource management in kubernetes. In Proceedings of the 9th International Conference on Utility and Cloud Computing, Shanghai, China, 6–9 December 2016; pp. 257–262. [Google Scholar]
- Dirac, G.A. Some theorems on abstract graphs. Proc. Lond. Math. Soc. 1952, 3, 69–81. [Google Scholar] [CrossRef]
Node | CPU | Memory | Disk | IP Address |
---|---|---|---|---|
Master | Intel Xeon E5 2687 2.70 GHz processor | 256 G | 1T | 172.16.0.10 |
WorkerA | Hygon C86 7159 2.0 GHz 32-core Processor | 256 G | 2T | 172.16.0.30 |
WorkerB | Hygon C86 7159 2.0 GHz 32-core Processor | 256 G | 2T | 172.16.0.31 |
WorkerC | Hygon C86 7159 2.0 GHz 32-core Processor | 256 G | 2T | 172.16.0.32 |
Layer | Candidate | Version | Vulnerability | Vulnerability Description | Size |
---|---|---|---|---|---|
1 | CentOS | 7.0 | CVE-2020-5291 | Can be used to gain root permissions | 209 MB |
Ubuntu | 14.04 | CVE-2014-1424 | Allow attackers to bypass AppArmor policies | 197 MB | |
2 | Apache | 2.4 | CVE-2017-7679 | Can read byte past the end of the buffer | 54 MB |
Nginx | 1.10 | CVE-2017-7529 | Leak of information triggered by specially request | 66 MB | |
Lighttpd | 1.4.11 | CVE-2018-19052 | Potential path traversal of a single directory | 78 MB |
Serial Number | Image ID | Image Tag | Mimic Layer 1 | Mimic Layer 2 |
---|---|---|---|---|
0 | 1816f2528ad0 | app:CentApch | CentOS | Apache |
1 | 99cc511d5595 | app:CentNgnx | CentOS | Nginx |
2 | 0689b34165ff | app:CentLght | CentOS | Lighttpd |
3 | 6fa35b2ba1c5 | app:UbunApch | Ubuntu | Apache |
4 | 60b82fc64a88 | app:UbunNgnx | Ubuntu | Nginx |
5 | 9a4486e0a7a0 | app:UbunLght | Ubuntu | Lighttpd |
Sequences S | |||
---|---|---|---|
- | - | G(0,1,2) ➀ → G(0,2,3) ➀ → G(2,3,5) ➁ → G(1,3,4) ➁ → G(0,2,4) ➀ → G(2,4,5) ➀ → G(2,3,4) ➀ → G(3,4,5) ➀ → G(1,4,5) ➀ → G(1,2,4) ➀ → G(1,2,3) ➂ → G(0,4,5) ➀ → G(3,4,5) ➀ → G(0,3,4) ➁ → G(0,2,5) ➁ → G(1,4,5) ➀ → G(0,1,4) ➂ → G(2,3,5) ➀ → G(1,2,5) ➁ → G(0,3,5) | |
10 | 1 | G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) ➂ → G(0,2,4) ➂ → G(1,3,5) | |
1 | 1 | G(0,1,2) ➁ → G(0,4,5) ➁ → G(2,3,5) ➁ → G(0,3,4) ➁ → G(1,2,3) ➂ → G(0,4,5) ➁ → G(1,3,5) ➁ → G(0,1,4) ➁ → G(0,2,3) ➁ → G(0,1,4) ➁ → G(0,2,3) ➁ → G(1,3,5) ➂ → G(0,2,4) ➁ → G(1,4,5) ➁ → G(1,2,3) ➁ → G(1,4,5) ➁ → G(0,1,2) ➁ → G(0,3,4) ➁ → G(2,3,5) ➁ → G(0,2,4) | |
1 | 10 | G(0,1,3) ➁ → G(2,3,5) ➁ → G(0,1,2) ➁ → G(2,4,5) ➁ → G(0,3,5) ➁ → G(1,2,3) ➁ → G(0,1,5) ➁ → G(0,2,3) ➁ → G(1,2,5) ➁ → G(0,2,4) ➁ → G(1,3,4) ➁ → G(0,4,5) ➁ → G(1,2,4) ➁ → G(1,3,5) ➁ → G(2,3,4) ➁ → G(0,1,4) ➁ → G(3,4,5) ➁ → G(0,2,5) ➁ → G(0,3,4) ➁ → G(1,4,5) |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Ying, F.; Zhao, S.; Deng, H. Microservice Security Framework for IoT by Mimic Defense Mechanism. Sensors 2022, 22, 2418. https://doi.org/10.3390/s22062418
Ying F, Zhao S, Deng H. Microservice Security Framework for IoT by Mimic Defense Mechanism. Sensors. 2022; 22(6):2418. https://doi.org/10.3390/s22062418
Chicago/Turabian StyleYing, Fei, Shengjie Zhao, and Hao Deng. 2022. "Microservice Security Framework for IoT by Mimic Defense Mechanism" Sensors 22, no. 6: 2418. https://doi.org/10.3390/s22062418
APA StyleYing, F., Zhao, S., & Deng, H. (2022). Microservice Security Framework for IoT by Mimic Defense Mechanism. Sensors, 22(6), 2418. https://doi.org/10.3390/s22062418