AIセキュリティポータル K Program
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management
Share
Abstract
Underwater datacenters (UDCs) hold promise as next-generation data storage due to their energy efficiency and environmental sustainability benefits. While the natural cooling properties of water save power, the isolated aquatic environment and long-range sound propagation in water create unique vulnerabilities which differ from those of on-land data centers. Our research discovers the unique vulnerabilities of fault-tolerant storage devices, resource allocation software, and distributed file systems to acoustic injection attacks in UDCs. With a realistic testbed approximating UDC server operations, we empirically characterize the capabilities of acoustic injection underwater and find that an attacker can reduce fault-tolerant RAID 5 storage system throughput by 17% up to 100%. Our closed-water analyses reveal that attackers can (i) cause unresponsiveness and automatic node removal in a distributed filesystem with only 2.4 minutes of sustained acoustic injection, (ii) induce a distributed database's latency to increase by up to 92.7% to reduce system reliability, and (iii) induce load-balance managers to redirect up to 74% of resources to a target server to cause overload or force resource colocation. Furthermore, we perform open-water experiments in a lake and find that an attacker can cause controlled throughput degradation at a maximum allowable distance of 6.35 m using a commercial speaker. We also investigate and discuss the effectiveness of standard defenses against acoustic injection attacks. Finally, we formulate a novel machine learning-based detection system that reaches 0% False Positive Rate and 98.2% True Positive Rate trained on our dataset of profiled hard disk drives under 30-second FIO benchmark execution. With this work, we aim to help manufacturers proactively protect UDCs against acoustic injection attacks and ensure the security of subsea computing infrastructures.
Dunking the data center
B. Cutler, S. Fowers, J. Kramer, E. Peterson
Published: 2017
Availability attacks on computing systems through alteration of environmental control: smart malware approach
K. Chung, Z. T. Kalbarczyk, R. K. Iyer
Published: 2019
pAElla: Edge AI-based real-time malware detection in data centers
A. Libri, A. Bartolini, L. Benini
Published: 2020
Malware detection in cloud infrastructures using convolutional neural networks
M. Abdelsalam, R. Krishnan, Y. Huang, R. Sandhu
Published: 2018
A new form of dos attack in a cloud and its avoidance mechanism
H. Liu
Published: 2010
Can a ddos attack meltdown my data center? a simulation study and defense strategies
Z. Anwar, A. W. Malik
Published: 2014
Forwarding-loop attacks in content delivery networks
J. Chen, X. Zheng, H.-X. Duan, J. Liang, J. Jiang, K. Li, T. Wan, V. Paxson
Published: 2016
Cross-VM side channels and their use to extract private keys
Y. Zhang, A. Juels, M. K. Reiter, T. Ristenpart
Published: 2012
Seriously, get off my cloud! cross-vm rsa key recovery in a public cloud
M. S. Inci, B. Gulmezoglu, G. Irazoqui, T. Eisenbarth, B. Sunar
Published: 2015
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
T. Ristenpart, E. Tromer, H. Shacham, S. Savage
Published: 2009
Why some like it loud: Timing power attacks in multi-tenant data centers using an acoustic side channel
M. A. Islam, L. Yang, K. Ranganath, S. Ren
Published: 2018
Exploiting a thermal side channel for power attacks in multi-tenant data centers
M. A. Islam, S. Ren, A. Wierman
Published: 2017
Ohm’s law in data centers: A voltage side channel for timing power attacks
M. A. Islam, S. Ren
Published: 2018
Deep note: Can acoustic interference damage the availability of hard disk storage in underwater data centers?
J. Sheldon, W. Zhu, A. Abdullah, K. Butler, M. J. Islam, S. Rampazzi
Published: 2023
Share