Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing

  title={Scheduler Vulnerabilities and Coordinated Attacks in Cloud Computing},
  author={Fangfei Zhou and M. Goel and P. Desnoyers and Ravi Sundaram},
  journal={2011 IEEE 10th International Symposium on Network Computing and Applications},
  • Fangfei Zhou, M. Goel, +1 author Ravi Sundaram
  • Published 2011
  • Computer Science
  • 2011 IEEE 10th International Symposium on Network Computing and Applications
  • Recently, cloud computing services such as Amazon EC2 have used virtualization to provide customers with virtual machines running on the provider's hardware, typically charging by wall clock time rather than resources consumed. Under this business model, manipulation of the scheduler may allow theft-of-service at the expense of other customers. We have discovered and implemented an attack scenario which when implemented on Amazon EC2 allowed virtual machines to consume more CPU time regardless… CONTINUE READING
    51 Citations
    Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing
    • 80
    Robust Coordination of Cloud-Internal Denial of Service Attacks
    • 16
    DoS Attacks on Your Memory in Cloud
    • 18
    • PDF
    An identification and prevention of theft-of-service attack on cloud computing
    • Azeem Ahmad, N. Nasser, M. Anan
    • Computer Science
    • 2016 International Conference on Selected Topics in Mobile & Wireless Networking (MoWNeT)
    • 2016
    • 6
    Cross-VM network attacks & their countermeasures within cloud computing environments


    Scheduler vulnerabilities and coordinated attacks in cloud computing
    • 39
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
    • 2,011
    • PDF
    Comparison of the three CPU schedulers in Xen
    • 370
    • PDF
    A comparison of software and hardware techniques for x86 virtualization
    • 700
    • PDF
    Scheduling I/O in virtual machine monitors
    • 373
    • PDF
    Improving Xen security through disaggregation
    • 239
    • PDF