2017
DOI: 10.1007/978-3-319-67262-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Low-Level Exploitation Mitigation by Diverse Microservices

Abstract: This paper discusses a combination of isolatable microservices and software diversity as a mitigation technique against low-level exploitation; the effectiveness and benefits of such an architecture are substantiated. We argue that the core security benefit of microservices with diversity is increased control flow isolation. Additionally, a new microservices mitigation technique leveraging a security monitor service is introduced to further exploit the architectural benefits inherent to microservice architectu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 9 publications
0
6
0
Order By: Relevance
“…The external threats come from other hosts, whereas internal threats arise from entities within the boundary of the system. Microservices architectures are vulnerable to both external and internal threats . Based on this aspect, we can categorize the works broadly into two.…”
Section: Taxonomy Based On Different Aspects Of Msasmentioning
confidence: 99%
See 1 more Smart Citation
“…The external threats come from other hosts, whereas internal threats arise from entities within the boundary of the system. Microservices architectures are vulnerable to both external and internal threats . Based on this aspect, we can categorize the works broadly into two.…”
Section: Taxonomy Based On Different Aspects Of Msasmentioning
confidence: 99%
“…These include users, microservices, and applications that are not part of the system under consideration. Otterstad and Yarygina discussed the various attack scenarios possible in microservices‐based systems . In order to raise the security level offered by microservices systems, the interfaces with direct contact to the external entities must be minimum, communication between microservices need to be eliminated, wherever redundant, and nodes with more security should be placed at the critical points in the network, so as to protect the more profitable microservices.…”
Section: Taxonomy Based On Different Aspects Of Msasmentioning
confidence: 99%
“…In particular, the µGE exploits the fact that a partially compromised microservice network has not yielded total control to the attacker. A strong separation of the control flow and increased isolation are inherent benefits of microservice architectures [8,9].…”
Section: Minimaxmentioning
confidence: 99%
“…Scale up and down n-variant services. The N-variant microservice system was proposed as a security measure by Otterstad&Yarygina [8]. This action uses the existing diversification techniques (compiler diversity/binary rewriting and cloud diversity) to spawn additional microservices, which feed their result to a governor node that compare the results for consistency.…”
Section: Intrusion Response: Defender's Actionsmentioning
confidence: 99%
See 1 more Smart Citation