IP Spoofing in and out of the Public Cloud

Total Page:16

File Type:pdf, Size:1020Kb

IP Spoofing in and out of the Public Cloud computers Article IP Spoofing In and Out of the Public Cloud: From Policy to Practice Natalija Vlajic *, Mashruf Chowdhury and Marin Litoiu Department of Electrical Engineering & Computer Science, York University, Toronto, ON M3J 1P3, Canada; [email protected] (M.C.); [email protected] (M.L.) * Correspondence: [email protected] Received: 28 August 2019; Accepted: 25 October 2019; Published: 9 November 2019 Abstract: In recent years, a trend that has been gaining particular popularity among cybercriminals is the use of public Cloud to orchestrate and launch distributed denial of service (DDoS) attacks. One of the suspected catalysts for this trend appears to be the increased tightening of regulations and controls against IP spoofing by world-wide Internet service providers (ISPs). Three main contributions of this paper are (1) For the first time in the research literature, we provide a comprehensive look at a number of possible attacks that involve the transmission of spoofed packets from or towards the virtual private servers hosted by a public Cloud provider. (2) We summarize the key findings of our research on the regulation of IP spoofing in the acceptable-use and term-of-service policies of 35 real-world Cloud providers. The findings reveal that in over 50% of cases, these policies make no explicit mention or prohibition of IP spoofing, thus failing to serve as a potential deterrent. (3) Finally, we describe the results of our experimental study on the actual practical feasibility of IP spoofing involving a select number of real-world Cloud providers. These results show that most of the tested public Cloud providers do a very good job of preventing (potential) hackers from using their virtual private servers to launch spoofed-IP campaigns on third-party targets. However, the same very own virtual private servers of these Cloud providers appear themselves vulnerable to a number of attacks that involve the use of spoofed IP packets and/or could be deployed as packet-reflectors in attacks on third party targets. We hope the paper serves as a call for awareness and action and motivates the public Cloud providers to deploy better techniques for detection and elimination of spoofed IP traffic. Keywords: IP spoofing; network security; cloud computing; firewalls; computer crime 1. Introduction IP spoofing—the simple act of modifying an IP packet by replacing its genuine source address with a forged one as illustrated in Figure1 has long been known as the key precursor for many di fferent forms of cyber attacks and illegitimate online activities, including man-in-the-middle (MitM) attacks, distributed denial of service (DDoS) attacks, ARP and DNS poisoning attacks, spoofed port scanning, etc. What makes IP spoofing particularly challenging for cybersecurity defenders is (a) the fact that no network is entirely immune to attacks that deploy IP spoofing, and (b) there are many readily available tools and programming packages that allow even moderately-skilled hackers to integrate IP spoofing into their attacks, such as Scapy, Hping, Libcrafter, etc. From a legal standpoint, IP spoofing in itself is not considered a criminal activity. As stated in [1], “Strictly speaking, the simple act of spoofing an identity is not illegal (i.e., no hacking is involved in the commission of the act). It only becomes illegal when a threat of death or violence is involved, or personal data are stolen in order to commit fraud or identity theft”. In fact, there are many legitimate reasons/operations that may require the use of packets with forged IP addresses (e.g., network troubleshooting, penetration testing, workload and stress testing, user anonymization, etc.). As a result, Computers 2019, 8, 81; doi:10.3390/computers8040081 www.mdpi.com/journal/computers Computers 2019, 8, x FOR PEER REVIEW 2 of 17 Computers 2019, 8, x FOR PEER REVIEW 2 of 17 network troubleshooting, penetration testing, workload and stress testing, user anonymization, etc.). Computers 2019, 8, 81 2 of 17 networkAs a result, troubleshooting, until relatively penetration recently, a testing, large number worklo ofad Internet and stress service testing, providers user anonymization, (ISPs) were turning etc.). Asa blind a result, eye until and allowingrelatively uninterrupted recently, a large transmission number of Internetof all sorts service of spoofed providers IP packets (ISPs) were generated turning by atheiruntil blind relativelycustomers. eye and allowing recently, However, auninterrupted large in the number past fewtransmission ofInternet years, the service of number all sorts providers of of ISPs spoofed (ISPs) that IPhave were packets started turning generated performing a blind by eye theiregressand allowingcustomers. filtering uninterrupted onHowever, their outbound in transmission the past traffic, few of byyears, all dr sortsopping the of number spoofed obviously IPof packetsISPs spoofed that generated haveoutgoing started by IP their performingpackets, customers. has egressgrownHowever, filtering considerably. in the on past their few This outbound years, has thelikely traffic, number come by ofas dr ISPs aopping result that have obviouslyof the started Mutually spoofed performing Agreed outgoing egress Norms IP filtering packets, for Routing on theirhas grownSecurityoutbound considerably. (MANRS) traffic, by initiative droppingThis has [2], obviouslylikely which come spoofedwas as introduceda result outgoing of inthe IP 2014 packets, Mutually by hasthe Agreed grownInternet considerably.Norms Society for (ISOC), Routing This hasthe Securityparentlikely come organization (MANRS) as a result initiative of of the the Internet Mutually[2], which Engineering Agreed was introduced Norms Task for Force Routingin 2014 (IETF) Securityby thestandards Internet (MANRS) body. Society initiative One (ISOC), of [2 ],the which thekey parentrecommendationswas introduced organization in 2014 imposed of bythe theInternet by Internet MANRS Engineering Society to its (ISOC), members Task the Force parent is that (IETF) organization ‘network standards operators of thebody. Internet implementOne Engineeringof the anti-key recommendationsspoofingTask Force filtering (IETF) standards imposedto prevent body.by packets MANRS One with of to the itsan key incorremembers recommendationsct sourceis that IP‘network address imposed operators from by MANRS entering implement to and its members leaving anti- spoofingtheiris that network’ ‘network filtering [2]. operators to To prevent date, implement more packets than anti-spoofingwith a hundred an incorre worldwide filteringct source to prevent network IP address packets operators from with entering (ISPs) an incorrect have and agreed sourceleaving to IP theirparticipateaddress network’ from in entering[2].MANRS, To date, and each leavingmore of themthan their arepresenting hundred network’ worldwide [2 ].dozens, To date, hundreds, network more than operators or a hundredin some (ISPs) cases, worldwide have thousands agreed network to of participatenetworkoperators subdomains (ISPs)in MANRS, have agreed [2]. each toof participatethem representing in MANRS, dozens, each ofhundreds, them representing or in some dozens, cases, hundreds,thousands or of in networksome cases, subdomains thousands [2]. of network subdomains [2]. Figure 1. Transmission of spoofed IP packets. FigureFigure 1. 1. TransmissionTransmission of of spoofed spoofed IP IP packets. packets. The Center for Applied Internet Data Analytics (CAIDA) [3] is a US-government funded group The Center for Applied Internet Data Analytics (CAIDA) [3] is a US-government funded group committedThe Center to performing for Applied comprehe Internet Datansive Analytics measurements (CAIDA) and [3] visualization is a US-government of various funded type ofgroup data committed to performing comprehensive measurements and visualization of various type of data committedpertaining to theperforming global Internet comprehe trafficnsive and measurements topology. Among and othervisualization publicly ofavailable various outputs type of of data this pertaining to the global Internet traffic and topology. Among other publicly available outputs of this pertaininggroup, the to real-time the global charts Internet depict trafficing andthe topology.global as wellAmong as country-by-countryother publicly available susceptibility outputs of tothis IP group, the real-time charts depicting the global as well as country-by-country susceptibility to IP spoofing group,spoofing the are real-time particularly charts interesting. depicting theAccording global asto wellthese as charts country-by-country (as of June 2019), susceptibility on average, to only IP are particularly interesting. According to these charts (as of June 2019), on average, only 15% to 30% of spoofing15% to 30%are particularlyof spoofed trafficinteresting. is not According successfully to thesedetected charts and (as blocked of June by 2019), worldwide on average, ISPs. only This spoofed traffic is not successfully detected and blocked by worldwide ISPs. This suggests that at present, 15%suggests to 30% that of at spoofed present, traffic globally, is not and successfully on average, detected ISPs do and a reasonably blocked by good worldwide job of dealing ISPs. Thiswith globally, and on average, ISPs do a reasonably good job of dealing with spoofed IP traffic. However, it suggestsspoofed thatIP traffic. at present, However, globally, it is and important on average, to note ISPs that do deviationsa reasonably from good this job average of dealing are withquite
Recommended publications
  • Kalray, Vates and Scaleway Announce Collaboration to Develop and Deliver Virtualization Solutions Powered by Acceleration Dpu-Based Cards
    KALRAY, VATES AND SCALEWAY ANNOUNCE COLLABORATION TO DEVELOP AND DELIVER VIRTUALIZATION SOLUTIONS POWERED BY ACCELERATION DPU-BASED CARDS The companies intend to provide a power-optimized and energy-saving virtualization stack using Kalray's acceleration cards and targeting data-intensive applications. Grenoble / Paris - France, July 12,2021 - Kalray (Euronext Growth Paris : ALKAL), a leading provider in the new generation of processors specialized in Intelligent Data Processing from Cloud to Edge, Vates, an open source software company specializing in secure and open source virtualization, and Scaleway, the leading French and European alternative IaaS and PaaS provider and Bare Metal pioneer, announce their collaboration to promote an energy-optimized and secure environment in data centers. This first collaboration will combine Kalray's new K200-LP™ acceleration card, incorporating Kalray's latest generation MPPA® DPU Coolidge™ processor, with Vates' optimized XCP-ng open source virtualization solution to create a secure, performance-optimized virtualization stack targeting data-intensive applications. This stack could be operated and managed by vendors, particularly French or European sovereign vendors in Scaleway's ultra-high performance environmental data centers. Virtualization environments have been a huge success for more than a decade in the data center world by allowing a large number of virtual machines to run on a single physical machine. These environments are now widely deployed both in the Cloud and in on-premise data centers. However, the hypervisor, the software part that is at the heart of these environments, must evolve to continue to be more efficient in terms of performance and energy consumption, while being more flexible and more secure.
    [Show full text]
  • Hitachi Cloud Accelerator Platform Product Manager HCAP V 1
    HITACHI Inspire the Next 2535 Augustine Drive Santa Clara, CA 95054 USA Contact Information : Hitachi Cloud Accelerator Platform Product Manager HCAP v 1 . 5 . 1 Hitachi Vantara LLC 2535 Augustine Dr. Santa Clara CA 95054 Component Version License Modified 18F/domain-scan 20181130-snapshot-988de72b Public Domain Exact BSD 3-clause "New" or "Revised" a connector factory 0.0.9 Exact License BSD 3-clause "New" or "Revised" a connector for Pageant using JNA 0.0.9 Exact License BSD 3-clause "New" or "Revised" a connector for ssh-agent 0.0.9 Exact License a library to use jsch-agent-proxy with BSD 3-clause "New" or "Revised" 0.0.9 Exact sshj License Exact,Ma activesupport 5.2.1 MIT License nually Identified Activiti - BPMN Converter 6.0.0 Apache License 2.0 Exact Activiti - BPMN Model 6.0.0 Apache License 2.0 Exact Activiti - DMN API 6.0.0 Apache License 2.0 Exact Activiti - DMN Model 6.0.0 Apache License 2.0 Exact Activiti - Engine 6.0.0 Apache License 2.0 Exact Activiti - Form API 6.0.0 Apache License 2.0 Exact Activiti - Form Model 6.0.0 Apache License 2.0 Exact Activiti - Image Generator 6.0.0 Apache License 2.0 Exact Activiti - Process Validation 6.0.0 Apache License 2.0 Exact Addressable URI parser 2.5.2 Apache License 2.0 Exact Exact,Ma adzap/timeliness 0.3.8 MIT License nually Identified aggs-matrix-stats 5.5.1 Apache License 2.0 Exact agronholm/pythonfutures 3.3.0 3Delight License Exact ahoward's lockfile 2.1.3 Ruby License Exact Exact,Ma ahoward's systemu 2.6.5 Ruby License nually Identified GNU Lesser General Public License ai's
    [Show full text]
  • Formation Conteneurs
    FORMATION CONTENEURS 1 ABOUT THESE TRAINING MATERIALS 2 . 1 TRAINING MATERIALS WRITTEN BY PARTICULE ex Osones/Alterway Cloud Native experts Devops experts Our training offers: https://particule.io/en/trainings/ Sources: https://github.com/particuleio/formations/ HTML/PDF: https://particule.io/formations/ 2 . 2 COPYRIGHT License: Creative Commons BY-SA 4.0 Copyright © 2014-2019 alter way Cloud Consulting Copyright © 2020 particule. Since 2020, all commits are the property of their owners 2 . 3 GOALS OF THE TRAINING: CLOUD Understand concepts and benefits of cloud Know the vocabulary related to cloud Overview of cloud market players and focus on AWS and OpenStack Know how to take advantage of IaaS Be able to decide what is cloud compatible or not Adapt its system administration and development methods to a cloud environment 2 . 4 CLOUD, OVERVIEW 3 . 1 FORMAL DEFINITION 3 . 2 SPECIFICATIONS Provide one or more service(s)... Self service Through the network Sharing resources Fast elasticity Metering Inspired by the NIST definition https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800- 145.pdf 3 . 3 SELF SERVICE User goes directly to the service No humain intermediary Immediate responses Services catalog for their discovery 3 . 4 THROUGH THE NETWORK User uses the service through the network The service provider is remote to the consumer Network = internet or not Usage of standard network protocols (typically: HTTP) 3 . 5 SHARING RESSOURCES A cloud provided services to multiple users/organizations (multi-tenant) Tenant or project: logical isolation of resources Resources are available in large quantities (considered unlimited) Resources usage is not visible Accurate location of resources is not visible 3 .
    [Show full text]
  • The State of the Internet in France 2019 REPORT
    2019 The state of the internet in France 2019 REPORT French Republic - June 2019 The state of the internet in France 2019 REPORT TABLE OF CONTENTS ENSURING THE INTERNET ENSURING FUNCTIONS PROPERLY 08 INTERNET OPENNESS 47 1. IMPROVING INTERNET 4. GUARANTEEING QUALITY OF SERVICE NET NEUTRALITY 48 MEASUREMENT 10 1. Arcep’s commitment 1. Potential biases of quality at the European level 48 of service measurement 10 2. Work in progress 49 2. Work begun in 2018 3. Analysing observed practices 57 on characterising the user environment 11 4. European cooperation for a coherent application of the Regulation 59 3. Towards more transparent and robust testing methodologies 12 4. Importance of choosing 5. FOSTERING THE OPENNESS the right test servers 17 OF DEVICES 61 5. How to maximise a QoS 1. Arcep’s work 61 test’s reliability? 20 2. Regulatory review 62 6. Arcep’s monitoring of mobile Internet quality 20 3. Review of market practices 63 2. MONITORING DATA Lexicon 66 INTERCONNECTION MARKET 23 Annex 1: Implementation of an Application 1. The internet’s evolving architecture 23 Programming Interface (API) in boxes 71 2. State of data interconnection Annex 2: in France 27 Test servers provided by the different quality of service measurement tools 74 3. ACCELERATING Annex 3: Increasing the accuracy THE TRANSITION TO IPv6 34 of QoS testing 79 1. IPv4 addresses are running out quickly, the transition to IPv6 is a growing imperative 34 2. Barometer of the transition to IPv6 in France 35 3. Co-construction with the ecosystem to accelerate the transition to IPv6 41 04 THE STATE OF THE INTERNET IN FRANCE Arcep’s 2019 Arcep examines Internet components and vital signs that it is responsible Internetfor monitoring: quality ofcheck-up service, data interconnection, the transition to IPv6, net neutrality and the openness of devices.
    [Show full text]
  • Cloud Providers Spreadsheet Digitalocean Amazon Azure
    Cloud Providers Spreadsheet Digitalocean Amazon Azure Ferdy misapplying supplementally? Shotten Thorpe speed-ups roundly or schillerize ringingly when Michal is mythic. Posticous Broddie sometimes invigilated any sprawl albumenised unboundedly. Our business areas of these services you do i deployed using cloud providers See how can unique fingerprint was generated and verify it roam the blockchain. Depending on the internet speed of the viewer, AWS automatically streams the video at the appropriate resolution. Google cloud providers, amazon web apps that generates the. Worked for HKT Teleservices under the account of PCCW Global. The cloud provides managed spark, provide is usually work towards a service, feel free tier is? This is where your notebooks, BI tools like Tableau or Quicksight, or your machine learning toolchain lives. There are amazon cloud providers have been excluded, azure to prevent asset losses and spreadsheet sits at reverie employees have no experience. We try or leave a positive mark on go world through infant and technology. Data algorithms allow Fairmarkit to be intelligent with how they recommend their suppliers, and ultimately drive more business. For companies in the cloud computing space, an obvious partner is AWS, which has many programs built to help support its ecosystem for developers. APIs for maps, routes, and places based on Google Maps. Aws provides amazon ebs volumes to provide a provider. Why AWS is important? If you need. Swit is a team collaboration platform that seamlessly combines team chat with task managements in a new way. The text data some of TOAST, designed on here own technology and established in Pan.
    [Show full text]
  • Automatická Konfigurace Serverů a Instalace OS
    ZADÁNÍ BAKALÁŘSKÉ PRÁCE I. OSOBNÍ A STUDIJNÍ ÚDAJE Příjmení: Skružný Jméno: Petr Osobní číslo: 457860 Fakulta/ústav: Fakulta informačních technologií Zadávající katedra/ústav: Katedra počítačových systémů Studijní program: Informatika Studijní obor: Bezpečnost a informační technologie II. ÚDAJE K BAKALÁŘSKÉ PRÁCI Název bakalářské práce: Automatická konfigurace serverů a instalace OS Název bakalářské práce anglicky: Automactic server configuration and OS installation Pokyny pro vypracování: Prozkoumejte volně dostupné systémy pro automatickou instalaci serverů, např. Foreman, Ironic, Crowbar, MaaS. Vyberte z nich jeden nejvhodnější na základě funkcionality, jednoduchosti instalace, použití a velikosti uživatelské základny a vytvořte konfiguraci pro instalaci Linuxu (ideálně s podporou více distribucí) a Windows na dvou druzích serverů (HPE, SuperMicro). Systém by měl umět mimo instalace operačního systému na servery také nastavit IP adresy rozhraní pro správu serveru a rozhraní do datové sítě a konfigurovat RAID řadiče serverů. Seznam doporučené literatury: Dodá vedoucí práce. Jméno a pracoviště vedoucí(ho) bakalářské práce: Ing. Tomáš Vondra, Ph.D., katedra kybernetiky FEL Jméno a pracoviště druhé(ho) vedoucí(ho) nebo konzultanta(ky) bakalářské práce: Datum zadání bakalářské práce: 31.12.2018 Termín odevzdání bakalářské práce: _____________ Platnost zadání bakalářské práce: _____________ ___________________________ ___________________________ ___________________________ Ing. Tomáš Vondra, Ph.D. podpis vedoucí(ho) ústavu/katedry doc. RNDr.
    [Show full text]
  • Formation Openstack
    FORMATION OPENSTACK 1 ABOUT THESE TRAINING MATERIALS 2 . 1 TRAINING MATERIALS WRITTEN BY PARTICULE ex Osones/Alterway Cloud Native experts Devops experts Our training offers: https://particule.io/en/trainings/ Sources: https://github.com/particuleio/formations/ HTML/PDF: https://particule.io/formations/ 2 . 2 COPYRIGHT License: Creative Commons BY-SA 4.0 Copyright © 2014-2019 alter way Cloud Consulting Copyright © 2020 particule. Since 2020, all commits are the property of their owners 2 . 3 INTRODUCTION 3 . 1 GOALS OF THE TRAINING: CLOUD Understand concepts and benefits of cloud Know the vocabulary related to cloud Overview of cloud market players and focus on AWS and OpenStack Know how to take advantage of IaaS Be able to decide what is cloud compatible or not Adapt its system administration and development methods to a cloud environment 3 . 2 GOALS OF THE TRAINING: OPENSTACK Discover OpenStack and use its different services Know how the project works and its capabilities Understand the internals of each OpenStack component Be able to make the right configuration choices Be capable of manually deploying an OpenStack cloud providing IaaS Know the best practices for deploying OpenStack Be able to track down the cause of an error in OpenStack Be able how to react in front of a bug and know the fix process 3 . 3 REQUIREMENTS Advanced sys admin skills for Linux such as Ubuntu, Red Hat or Debian, including: Package management Configuration files and services handling LVM (Logical Volume Management) and filesystems Notions: Virtualization: KVM (Kernel-based Virtual Machine), libvirt Network: iptables, namespaces SQL Optional: Comfortable in a Python environment 3 .
    [Show full text]
  • SOLUTION CLOUD : LAQUELLE CHOISIR ? Cloud Radar - AWS, Azure, Google Cloud Avant-Propos
    SOLUTION CLOUD : LAQUELLE CHOISIR ? Cloud Radar - AWS, Azure, Google Cloud Avant-propos Pourquoi cette étude ? La documentation sur le sujet du cloud devient pléthorique, mais il est malheu- reusement rare de trouver une ressource indépendante, objective et com- parative. En effet, les différents acteurs mondiaux du Cloud ont des histoires et des philosophies très différentes, qui les ont poussés à proposer des outils eux-mêmes uniques. Nous retrouvons bien évidemment des points communs à tous, comme la ca- pacité de démarrer des serveurs virtuels, plus ou moins spécialisés, mais cela ne constitue que la base de ces services. À l’inverse, c’est ce qui différencie ces fournisseurs qui est le plus intéressant. Comme nous allons le voir, les clouds proposent des services souvent com- parables, mais pas équivalents pour autant. Amazon Web Services offre une palette de service quasi infinie, est le roi du micro service, mais à des coûts souvent plus élevés que ses concurrents, et n’offre pas toujours les meilleures performances selon l’usage ciblé. Si vous êtes dans l’analyse de données, le fameux “Big Data”, l’intelligence artificielle, ou le container, Google Cloud Platform sera plus adapté. Si vous êtes déjà très empreint de culture Microsoft, Azure pourrait s’imposer. Il n’y a donc pas “un” cloud ou “le” cloud, mais plusieurs infrastructures avec chacune leurs forces et leurs faiblesses. Le but de cette étude comparative est, à ce titre, de mettre en lumière ces différences afin de vous guider dans le choix du bon cloud, selon vos enjeux et vos besoins. Sommaire Une étude indépendante et scientifique Oceanet Technology souhaite souligner qu’aucune rémunération, sous aucune forme directe ou indirecte, n’a été perçue par l’équipe d’auteurs ou la société.
    [Show full text]
  • Iaas - Introduction
    POUR DES COMPÉTENCES TOUJOURS À LA POINTE IaaS - Introduction Emmanuel Braux Institut Mines Telecom / IMT Atlantique [email protected] Institut Mines-Télécom Plan IaaS - Introduction . Architectures Cloud . IaaS Institut Mines-Télécom IaaS - Introduction ► Architectures Cloud Définition et concepts « Whatever » as a service Types de Cloud IaaS Institut Mines-Télécom IaaS - Introduction Architectures Cloud ► Définition et concepts « Whatever » as a service Types de Cloud Les acteurs du IaaS Vocabulaire liés au IaaS Institut Mines-Télécom IaaS - Introduction Wikipédia dit : « Le cloud computing, [. ], est l’exploitation de la puissance de calcul ou de stockage de serveurs informatiques distants par l’intermédiaire d’un réseau, généralement l’internet. [. ] le cloud computing est l’accès via un réseau de télécommunications, À LA DEMANDE et EN LIBRE-SERVICE, à des ressources informatiques partagées, configurables. [. ] Il s’agit donc d’une délocalisation de l’infrastructure informatique. » Institut Mines-Télécom IaaS - Introduction Concepts . Accès à des services en ligne • Puissance de calcul, capacité de stockage, fonctionnalités réseau, … • Outils, Applications, environnement de travail . En mode « libre-service » (notion de catalogue) . A la demande et facturation à l’usage . Flexibilité et élasticité Institut Mines-Télécom IaaS - Introduction Architectures Cloud Définition et concepts ► « Whatever » as a service Types de Cloud IaaS Institut Mines-Télécom IaaS - Introduction XaaS : Whatever as a Service . Principalement • IaaS Infrastructure as a Service • PaaS Platform as a Service • SaaS Software as a Service . Mais aussi • Database as a Service • Network as a Service • Storage as a Service • Load balancing as a Service • DNS as a Service • Caas, Faas, Kaas, • … Institut Mines-Télécom IaaS - Introduction SaaS : Software as a service .
    [Show full text]
  • Comparative Performance Evaluation of Popular Virtual Private Servers 343
    Comparative Performance Evaluation of Popular Virtual Private Servers 343 Comparative Performance Evaluation of Popular Virtual Private Servers Josip Balen1, Denis Vajak1, Khaled Salah2 1 Faculty of Electrical Engineering, Computer Science and Information Technology Osijek, J. J. Strossmayer University of Osijek, Croatia 2 ECE Department, Khalifa University of Science, Technology and Research, UAE [email protected], [email protected], [email protected]* Abstract trend inspired by cloud computing, can be observed, as described in [1-2] and [3]. In order to meet user Virtual Private Server (VPS) enables user access to an demands for a high performance, new technologies and operating system instance with a fine-grained control of services emerged, such as grid, utility computing, private software and hardware resources. Many various virtualization or autonomic, mobile, and pervasive factors can affect VPS performance and they primarily computing. The main advantage of these technologies include physical server hardware specifications, installed is that users can use them according to their nees as operating system, virtualization layer, and the underlying they enable ubiquitous, convenient, on-demand network infrastructure. Therefore, it is very important to network access to a shared pool of configurable properly select a VPS host that meets users, applications computing resources that can be rapidly provisioned and services resource and performance requirements. and released with a minimal management effort or This paper presents a performance evaluation of three service provider interaction, as described in [4-6] and popular VPS hosts; namely Digital Ocean, Linode and [7]. VULTR. Performance measurement was conducted under Virtual Private Servers (VPS) offer a cost-effective the same controlled conditions for all three VPS hosts way of providing a powerful and flexible multipurpose using a popular benchmark application for Unix server.
    [Show full text]
  • Tina Compatibility Guide
    Compatibility Guide Tina 2021 Atempo Paris Headquarters |23 Avenue Carnot, 91300 MASSY|Tél: +33 164 868 300 |[email protected] N°1 EUROPEAN SOFTWARE VENDOR FOR DATA PROTECTION ATEMPO.COM Details of this document Title Tina 2021 Type Compatibility Guide Date 30/04/2021 Author Renaud Bonnevie Classification Public Status Released Version 30/04/2021 Release Tina 2021 Atempo Paris Headquarters |23 Avenue Carnot, 91300 MASSY|Tél: +33 164 868 300 |[email protected] N°1 EUROPEAN SOFTWARE VENDOR FOR DATA PROTECTION ATEMPO.COM Compatibility Guide Author : Renaud Bonnevie Tina 2021 Diffusion : Public Date : 30/04/2021 Table of contents General Information .......................................................................................................................................................................................................................... 4 Important Notices ............................................................................................................................................................................................................................. 4 Time Navigator Operating System compatibility ........................................................................................................................................................................... 7 HyperVision Agent for VMware ......................................................................................................................................................................................................
    [Show full text]
  • Scaleway Dc5 Data Center Case Study
    SCALEWAY DC5 DATA CENTER CASE STUDY INDUSTRY: TELECOMMUNICATIONS, INTERNET HOSTING, CLOUD COMPUTING CUSTOMER: Scaleway SAS, DC5 Datacenter LOCATION: Saint-Ouen-l’Aumône, France BACKGROUND: Scaleway is an IT solutions provider that delivers hosting, cloud, colocation, and managed services to customers in the Paris metro region. As one of the largest data center operators in Europe, Scaleway designs, builds and operates data center infrastructures and manages over 60,000 square meters of reliable, e cient, secure data center space. Scaleway’s new hyperscale data center, DC5. Scaleway selected an old, strategically located mail sorting o ce in a popular business and industrial park near Paris to convert into the new DC5 facility. PROBLEMS Reliable, cost-e ective, year-round cooling that met the company’s pressure drop TO SOLVE: requirements was a top priority for Scaleway’s new data center, DC5. Cooling was crucial to the design of Scaleway’s DC5. The facility is located in France, where the climate is temperate and air conditioning is uncommon. Europe’s recommended maximum PUE of 1.3 for new data centers had to be met, and Scaleway’s goal was to be below 190 Pa at 925 ft/min (4.7 m/s). Finding a solution below 200 Pa was a challenge. WHY ARMSTRONG?: Only Armstrong’s customized, best-in-class adiabatic cooling technology could deliver the high level of performance Scaleway required. Scaleway turned to Armstrong’s EvaPack™ because its innovative adiabatic process enables 100% of the outside air to evaporate through a cooling and humidifi cation system. Armstrong’s solution o ered the dependable cooling and precise control of relative humidity required to maintain an optimum data center environment—while meeting the company’s goals for e ciency and cost.
    [Show full text]