Statically Defend Network Consumption Against Acker Failure Vulnerability in Storm

  • Wenjun Qian
  • Qingni Shen
  • Yizhe Yang
  • Yahui Yang
  • Zhonghai Wu
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)

Abstract

Storm has been a popular distributed real-time computation system for stream data processing, which currently provides an acker mechanism to enable all topologies to be processed reliably. In this paper, via the source code analysis, we point out that the acker failure and message retransmission result in the consumption of network resources. Even worse, adversary conducts a malicious topology to consume over unconstrained network resources, which seriously affects the average processing time of topology for normal users. Aiming at defending the vulnerability, we design an offline static detection against acker failure in Storm, mainly including the code decompile, the function call relationship and the judgement rules in offline module. Meanwhile, we validate the protection scheme in Storm 0.10.0 cluster, and experimental results show that our mentioned judgement rules can achieve well precision.

Keywords

Stream data Storm Acker failure Message retransmission Network consumption 

Notes

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grant No. 61672062, 61232005, and the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016009. Thanks to Lingyun Guo and Liming Zheng for the support of experimental data collection and stream grouping analysis.

References

  1. 1.
  2. 2.
  3. 3.
  4. 4.
  5. 5.
    Alguliyev, R., Imamverdiyev, Y.: Big data: big promises for information security. In: IEEE International Conference on Application of Information and Communication Technologies, pp. 1–4 (2014)Google Scholar
  6. 6.
    Aritsugi, M., Nagano, K.: Recovery processing for high availability stream processing systems in local area networks. In: TENCON 2010–2010 IEEE Region 10 Conference, pp. 1036–1041 (2010)Google Scholar
  7. 7.
    Bertino, E., Ferrari, E.: Big data security and privacy. In: IEEE International Congress on Big Data, pp. 757–761 (2015)Google Scholar
  8. 8.
    Dinh, T.T.A., Saxena, P., Chang, E.C., Ooi, B.C., Zhang, C.: M2R: enabling stronger privacy in MapReduce computation (2015)Google Scholar
  9. 9.
    Dromard, J., Roudiere, G., Owezarski, P.: Online and scalable unsupervised network anomaly detection method. IEEE Trans. Netw. Serv. Manag. PP(99), 1 (2017)Google Scholar
  10. 10.
    Khaokaew, Y., Anusas-Amornkul, T.: A performance comparison of feature selection techniques with SVM for network anomaly detection. In: International Symposium on Computational and Business Intelligence, pp. 85–89 (2016)Google Scholar
  11. 11.
    Nagano, K., Itokawa, T., Kitasuka, T., Aritsugi, M.: Exploitation of backup nodes for reducing recovery cost in high availability stream processing systems. In: Fourteenth International Database Engineering & Applications Symposium, pp. 61–63 (2010)Google Scholar
  12. 12.
    Neumeyer, L., Robbins, B., Nair, A., Kesari, A.: S4: distributed stream computing platform. In: IEEE International Conference on Data Mining Workshops, pp. 170–177 (2011)Google Scholar
  13. 13.
    Ohrimenko, O., Costa, M., Fournet, C., Gkantsidis, C., Kohlweiss, M., Sharma, D.: Observing and preventing leakage in MapReduce (2015)Google Scholar
  14. 14.
    Roy, I., Setty, S.T.V., Kilzer, A., Shmatikov, V., Witchel, E.: Airavat: security and privacy for MapReduce. In: Usenix Symposium on Networked Systems Design and Implementation, NSDI 2010, 28–30 April 2010, San Jose, CA, USA, pp. 297–312 (2010)Google Scholar
  15. 15.
    Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl. Based Syst. 10(05), 557–570 (2002)MathSciNetCrossRefGoogle Scholar
  16. 16.
    Takabi, H., Joshi, J.B.D., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
  17. 17.
    Wang, Z., Yang, J., Zhang, H., Li, C., Zhang, S., Wang, H.: Towards online anomaly detection by combining multiple detection methods and storm. In: Network Operations and Management Symposium, pp. 804–807 (2016)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Wenjun Qian
    • 1
    • 2
  • Qingni Shen
    • 1
    • 2
  • Yizhe Yang
    • 2
    • 3
  • Yahui Yang
    • 1
    • 2
  • Zhonghai Wu
    • 1
    • 2
  1. 1.School of Software and MicroelectronicsPeking UniversityBeijingChina
  2. 2.National Engineering Research Center for Software EngineeringPeking UniversityBeijingChina
  3. 3.School of Electronics and Computer EngineeringPeking UniversityShenzhenChina

Personalised recommendations