Energy and Green Computing Energy cost has become a major factor in - - PowerPoint PPT Presentation

energy and green computing
SMART_READER_LITE
LIVE PREVIEW

Energy and Green Computing Energy cost has become a major factor in - - PowerPoint PPT Presentation

Zhenyu Wu, Mengjun Xie and Haining Wang Department of Computer Science College of William and Mary Presenter: Zhenyu Wu The College of Currently affiliated with W ILLIAM M ARY University of Arkansas at Little Rock Energy and Green


slide-1
SLIDE 1

The College of

WILLIAM MARY

Zhenyu Wu, Mengjun Xie† and Haining Wang Department of Computer Science College of William and Mary Presenter: Zhenyu Wu

† Currently affiliated with

University of Arkansas at Little Rock

slide-2
SLIDE 2

The College of

WILLIAM MARY

Energy and Green Computing

Energy cost has become a major factor in the total cost

  • f ownership (TCO) of large-scale server clusters

2

slide-3
SLIDE 3

The College of

WILLIAM MARY

Energy and Green Computing

Millions of tons of carbon-dioxide are generated in

  • rder of power data centers

Two Google searches = boiling a cup of coffee Global data center carbon emission (2007)

3

slide-4
SLIDE 4

The College of

WILLIAM MARY

Energy Proportional Computing

Aims to make servers consume energy proportional to

its workload.

4

slide-5
SLIDE 5

The College of

WILLIAM MARY

Power usage break down:

Energy Proportional Computing

5

174W (134%)

slide-6
SLIDE 6

The College of

WILLIAM MARY

Potential Vulnerabilities

Energy efficient computing assumes a cooperative

working environment

Power saving is passive, dependent on workload Not all workload consumes identical amount of energy

=

6 Alex Wissner-Gross, How you can help reduce the footprint of the Web

slide-7
SLIDE 7

The College of

WILLIAM MARY

Formulating Attack Vectors

Attack Vector:

Isolate high energy cost requests

Analyze the triggering conditions

Reproduce in high concentration

High percentages, but no necessarily large amounts

Vulnerable systems: open services, such as search

engine, knowledge base, public forum, etc.

Have little or no control over the incoming request Energy consumption is largely dependent on the type

and amount of service requests

7

slide-8
SLIDE 8

The College of

WILLIAM MARY

Designing an Energy Attack

We use a Wikipedia mirror server as the victim

Publicly available large scale database Representative of standard open Internet services

We discover the attack vector by profiling the server

Powered by MediaWiki, a large scale content

management system.

Two levels of caching for efficient operation

Object Cache – for dynamically generated pages Memory Cache – for recently executed database queries

8

slide-9
SLIDE 9

The College of

WILLIAM MARY

Designing an Energy Attack

9

slide-10
SLIDE 10

The College of

WILLIAM MARY

Designing an Energy Attack

Keys to launching the energy attack:

Generate Cache Misses

Much higher energy/request than normal workload

Avoid Generating Anomalies

Be low profile, non-obtrusive Must not generate traffic anomaly Must not cause obvious performance degradation

10

slide-11
SLIDE 11

The College of

WILLIAM MARY

Designing an Energy Attack

Website access profiling

Cache Misses:

The frequency of a web page being accessed is inversely

proportional to its rank (Zipf’s law)

A small number of web pages are accessed very frequently

A large number of web pages are accessed very infrequently

Different access patterns = Cold pages = Cache misses

Stealthiness:

The request inter-arrival time of human users follow Pareto

distribution

The attackers can mimic normal users by sending requests at

average rates, and following Pareto distribution

11

slide-12
SLIDE 12

The College of

WILLIAM MARY

Measurements and Evaluations

Server Configurations:

Dual Intel Xeon 5540 quad-core processor 6GB DDR3 SDRAM 2TB SATA HDD in RAID 5 Power usage monitored by Watts Up PRO power meter

Experiment Methodology

The server is able to stably support accesses from up to

100 benign clients.

At different benign workloads (5~100 clients), we launch

attack with varying intensity

Measure the increase in power consumption and latency

√ ×

12

slide-13
SLIDE 13

The College of

WILLIAM MARY

Measurements and Evaluations

Workload – Response Time Profile (Normal)

13

slide-14
SLIDE 14

The College of

WILLIAM MARY

Measurements and Evaluations

Workload – Power Consumption Profile (Normal)

14

slide-15
SLIDE 15

The College of

WILLIAM MARY

Power vs. Latency Increase at high workloads (100 clients)

15

Measurements and Evaluations

slide-16
SLIDE 16

The College of

WILLIAM MARY

Power vs. Latency Increase at medium workloads (50 clients)

Measurements and Evaluations

slide-17
SLIDE 17

The College of

WILLIAM MARY

Power vs. Latency Increase at low workloads (10 clients)

17

Measurements and Evaluations

slide-18
SLIDE 18

The College of

WILLIAM MARY

Measurements and Evaluations

Damage achieved:

6.2% ~ 42.3%

additional power usage, depending on workload.

For typical server

workloads: 21.7% ~ 42.3% power wastage

18

slide-19
SLIDE 19

The College of

WILLIAM MARY

Measurements and Evaluations

Damage achieved:

6.2% ~ 42.3%

additional power usage, depending on workload.

For typical server

workloads: 21.7% ~ 42.3% power wastage

19

slide-20
SLIDE 20

The College of

WILLIAM MARY

Alternative Energy Attack Vectors

Algorithmic Complexity Attacks

Algorithms that have high worst-case run time

Plain quick sort, naïve hash-table, etc.

Originally proposed as DoS attacks, can be adapted to

use as energy attacks

Processors are the most power consuming devices Be stealthy: lower intensity, target non-computation intensive

servers (such as file depositing services)

20

slide-21
SLIDE 21

The College of

WILLIAM MARY

Alternative Energy Attack Vectors

Example:

Linux directory cache vulnerability

Simple hash for quick file name lookup Vulnerable to collision attack

FTP server

Setup: upload thousands of files with colliding names Attack: download, rename, read/write metadata, etc.

21

slide-22
SLIDE 22

The College of

WILLIAM MARY

Alternative Energy Attack Vectors

Sleep Deprivation Attacks

Originally proposed as DoS attacks in sensor network,

can be adapted to use as energy attacks

Target components that have large dynamic power range Doesn’t require high per-unit power consumption

Example:

A hard drive consumes 12~16 watts of power in

  • perational states, but only ~1 watt in spin-down

File servers usually have tens of hard drives! Malicious access patterns can interfere with power

management and prevent expected spin-down

22

slide-23
SLIDE 23

The College of

WILLIAM MARY

Challenge of Defense

The key is still missing:

What we want to do

Differentiate high energy cost workload

What we have at hand

Coarse grained power measurement instrument

“We are under attack! …

… And we have to suck it.”

Fine grained performance counters (approximation)

Good for single task systems (mobile phone / PDA / etc.) Incompetent for highly parallel environment

What we really need:

Fine grained power measurement support

23

slide-24
SLIDE 24

The College of

WILLIAM MARY

Future Work

Extend beyond single server

Server-clusters, server farms Data center, massively virtualized environment Etc.

Explore software-based countermeasures

Temporary workarounds to the lack of hardware support Explore possibility of inferring workload natures from

application behavior profiling

24