Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis

被引:5
|
作者
Carvalho, Glaucio H. S. [1 ]
Woungang, Isaac [1 ]
Anpalagan, Alagan [2 ]
机构
[1] Ryerson Univ, Dept Comp Sci, 350 Victoria St, Toronto, ON M5B 2K3, Canada
[2] Ryerson Univ, Dept Elect & Comp Engn, Toronto, ON M5B 2K3, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
Cloud security; DDoS; markov process; firewall; markov-modulated poisson process; PERFORMANCE ANALYSIS; FRAMEWORK; NETWORKS; INTERNET; MODEL;
D O I
10.1109/TCC.2020.3000674
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud firewalls stand as one of the major building blocks of the cloud security framework protecting the Virtual Private Infrastructure against attacks such as the Distributed Denial of Service (DDoS). In order to fully characterize the cloud firewall operation and gain actionable insights on the design of cloud security, performance models for the cloud firewall become imperative. In this article, we propose a multi-dimensional Continuous-Time Markov Chain model for the cloud firewall that takes into account the burstiness and correlation features of the legitimate and malicious data traffic. By adopting the Markov-Modulated Poisson process (MMPP) and the Interrupted Poisson Process (IPP), we identify the workload conditions under which the cloud firewall might be subject to a loss of availability. Furthermore, by comparing the IPP and Poisson attacks, we numerically verify that the cloud firewall is inherently vulnerable to a burstiness-aware attack which might seriously compromise its operation. Additionally, we characterize the joint harmful impact of burstiness and correlation on the cloud firewall that might lead to performance degradation. Finally, we design an elastic doud firewall by proposing a MMPP-driven load balancing procedure that provisions virtual firewalls dynamically while fulfilling a Service Level Agreement (SLA) latency specification.
引用
收藏
页码:1620 / 1633
页数:14
相关论文
共 50 条
  • [31] ASYMPTOTIC ANALYSIS OF A QUEUING MODEL WITH BURSTY TRAFFIC
    BURMAN, DY
    SMITH, DR
    BELL SYSTEM TECHNICAL JOURNAL, 1983, 62 (06): : 1433 - 1453
  • [32] Performance Modelling and Analysis of Software-Defined Networking under Bursty Multimedia Traffic
    Miao, Wang
    Min, Geyong
    Wu, Yulei
    Wang, Haozhe
    Hu, Jia
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2016, 12 (05)
  • [33] Queuing analysis of shared-buffer switches with control scheme under bursty traffic
    La Trobe Univ, Melbourne
    Comput Commun, 18 (1681-1692):
  • [34] Queuing analysis of shared-buffer switches with control scheme under bursty traffic
    Fong, S
    Singh, S
    COMPUTER COMMUNICATIONS, 1998, 21 (18) : 1681 - 1692
  • [35] Performance analysis of congestion control mechanism using queue thresholds under bursty traffic
    Guan, L
    Awan, I
    Woodward, ME
    UNIVERSAL MULTISERVICE NETWORKS, PROCEEDINGS, 2004, 3262 : 307 - 316
  • [36] Throughput and delay analysis of interrupt-driven kernels under poisson and bursty traffic
    Salah, K.
    Elbadawi, K.
    COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2007, 22 (1-2): : 5 - 14
  • [37] System resource utilization analysis and prediction for cloud based applications under bursty workloads
    Yin, Jianwei
    Lu, Xingjian
    Chen, Hanwei
    Zhao, Xinkui
    Xiong, Neal N.
    INFORMATION SCIENCES, 2014, 279 : 338 - 357
  • [38] An efficient and orderly implementation of bypass queue under bursty traffic
    Wu, JSC
    Lin, YD
    PARALLEL COMPUTING, 1998, 24 (14) : 2143 - 2148
  • [39] Convergence Routing under Bursty Traffic: Instability and an AIMD Controller
    Fourneau, J. M.
    Nott, D.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 151 (03) : 97 - 109
  • [40] On the use of adaptive grouping protocols under asymmetric bursty traffic
    Papadimitriou, GI
    COMPUTER COMMUNICATIONS, 2004, 27 (12) : 1137 - 1142