A novel covert channel detection method in cloud based on XSRM and improved event association algorithm

被引:4
|
作者
Wang, Lina [1 ,2 ]
Liu, Weijie [1 ,3 ]
Kumar, Neeraj [4 ]
He, Debiao [1 ,2 ]
Tan, Cheng [1 ]
Gao, Debin [3 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[4] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
基金
中国国家自然科学基金;
关键词
cloud security; covert channel detection; shared resource matrix; event association analysis; SECURITY; STORAGE;
D O I
10.1002/sec.1560
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channel is a major threat to the information system security and commonly found in operating systems, especially in cloud computing environment. Owing to the characteristics in cloud computing environment such as resources sharing and logic boundaries, covert channels become more varied and difficult to find. Focusing on those problems, this paper presents a universal method for detecting covert channel automatically. To achieve a global detection, we leveraged a virtual machine event record mechanism in hypervisor to gather necessary metadata. Combining the shared resources matrix methodology with events association mechanism, we proposed a distinctive algorithm that can accurately locate and analyze malicious covert channels from the respect of behaviors. Compared with the popular statistical test methods focusing on the single covert channel, our method is capable of recognizing and detecting more covert channels in real time. Experimental results show that this method is not only able to detect multilevel and multiform covert channels in cloud environment effectively but also facilitates the implementation and deployment in practical scenarios without modifying the existing system. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:3543 / 3557
页数:15
相关论文
共 50 条
  • [1] Covert Timing Channel Detection Method Based on Random Forest Algorithm
    Fu, Guangxin
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    2017 17TH IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY (ICCT 2017), 2017, : 165 - 171
  • [2] A Novel Deduplication-Based Covert Channel in Cloud Storage Service
    Hovhannisyan, Hermine
    Lu, Kejie
    Yang, Rongwei
    Qi, Wen
    Wang, Jianping
    Wen, Mi
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,
  • [3] An event detection algorithm based on improved STC
    Qiu, Li-Qing
    Bin-Pang
    Zhao, Li-Ping
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 528 - 532
  • [4] Study on the detection algorithm of covert network behavior channel based on corrected entropy
    Qian, Y.-W. (admon1999@163.com), 2013, Chinese Institute of Electronics (35):
  • [5] A Channel Selection Method for Event Related Potential Detection based on Random Forest and Genetic Algorithm
    Tang, Cong
    Xu, Tao
    Chen, Peng
    He, Yuebang
    Bezerianos, Anastasios
    Wang, Hongtao
    2020 CHINESE AUTOMATION CONGRESS (CAC 2020), 2020, : 5419 - 5424
  • [6] A network covert timing channel detection method based on threshold secret sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2020, 31 (02)
  • [7] An Event Detection Method Based on Association Link Network
    Sun, Lin
    Yang, Weijun
    Tang, Xinhuai
    2018 INTERNATIONAL SYMPOSIUM ON POWER ELECTRONICS AND CONTROL ENGINEERING (ISPECE 2018), 2019, 1187
  • [8] Covert Channel Detection: A Survey Based Analysis
    Gober, S. Zerafshan
    Javed, Barkha
    Saqib, Nazar Abbas
    2012 9TH INTERNATIONAL CONFERENCE ON HIGH CAPACITY OPTICAL NETWORKS AND EMERGING/ENABLING TECHNOLOGIES (HONET), 2012, : 57 - 64
  • [9] A Novel Covert Channel Based on Length of Messages
    Ji, Liping
    Jiang, Wenhao
    Dai, Benyang
    Niu, Xiamu
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 551 - 554
  • [10] A New Method for Authentication Based on Covert Channel
    Sun, Yanan
    Guan, Xiaohong
    Liu, Ting
    NETWORK AND PARALLEL COMPUTING, 2011, 6985 : 160 - 165