A novel covert channel detection method in cloud based on XSRM and improved event association algorithm

被引:4
|
作者
Wang, Lina [1 ,2 ]
Liu, Weijie [1 ,3 ]
Kumar, Neeraj [4 ]
He, Debiao [1 ,2 ]
Tan, Cheng [1 ]
Gao, Debin [3 ]
机构
[1] Wuhan Univ, Comp Sch, Wuhan, Peoples R China
[2] Minist Educ, Key Lab Aerosp Informat Secur & Trusted Comp, Wuhan, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore, Singapore
[4] Thapar Univ, Dept Comp Sci & Engn, Patiala, Punjab, India
基金
中国国家自然科学基金;
关键词
cloud security; covert channel detection; shared resource matrix; event association analysis; SECURITY; STORAGE;
D O I
10.1002/sec.1560
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Covert channel is a major threat to the information system security and commonly found in operating systems, especially in cloud computing environment. Owing to the characteristics in cloud computing environment such as resources sharing and logic boundaries, covert channels become more varied and difficult to find. Focusing on those problems, this paper presents a universal method for detecting covert channel automatically. To achieve a global detection, we leveraged a virtual machine event record mechanism in hypervisor to gather necessary metadata. Combining the shared resources matrix methodology with events association mechanism, we proposed a distinctive algorithm that can accurately locate and analyze malicious covert channels from the respect of behaviors. Compared with the popular statistical test methods focusing on the single covert channel, our method is capable of recognizing and detecting more covert channels in real time. Experimental results show that this method is not only able to detect multilevel and multiform covert channels in cloud environment effectively but also facilitates the implementation and deployment in practical scenarios without modifying the existing system. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:3543 / 3557
页数:15
相关论文
共 50 条
  • [31] Towards the Certification of Covert Channel Freeness in Cloud-Based Systems
    Jaskolka, Jason
    Khedri, Ridha
    6TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2015), THE 5TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2015), 2015, 52 : 318 - 325
  • [32] A Novel Hardware Trojan Detection Method Based on Side-Channel Analysis and PCA Algorithm
    He, Chunhua
    Hou, Bo
    Wang, Liwei
    En, Yunfei
    Xie, Shaofeng
    PROCEEDINGS OF 2014 10TH INTERNATIONAL CONFERENCE ON RELIABILITY, MAINTAINABILITY AND SAFETY (ICRMS), VOLS I AND II, 2014, : 1043 - 1046
  • [33] Method of Association Rule Mining Based on Improved Genetic Algorithm
    Xiang, Zhuoyuan
    Li, Ying
    2010 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING (MSE 2010), VOL 4, 2010, : 265 - 267
  • [34] An Improved Association Method of SLAM Based on Ant Colony Algorithm
    Zeng Wenjing
    Zhang Tiedong
    Wan Le
    Qin Zaibai
    ICIEA: 2009 4TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS, VOLS 1-6, 2009, : 1536 - 1539
  • [35] A Novel Multi-view Face Detection Method Based on Improved Real Adaboost Algorithm
    Xu, Wenkai
    Lee, Eung-Joo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2013, 7 (11): : 2720 - 2736
  • [36] A Cloud and Cloud Shadow Detection Method Based on Fuzzy c-Means Algorithm
    Ping Bo
    Su Fenzhen
    Meng Yunshan
    IEEE JOURNAL OF SELECTED TOPICS IN APPLIED EARTH OBSERVATIONS AND REMOTE SENSING, 2020, 13 : 1714 - 1727
  • [37] A Novel NILM Event Detection Algorithm Based on Different Frequency Scales
    Zhang, Fan
    Qu, Leitao
    Dong, Wei
    Zou, Hongbo
    Guo, Qiang
    Kong, Yaguang
    IEEE TRANSACTIONS ON INSTRUMENTATION AND MEASUREMENT, 2022, 71
  • [38] A novel method of landmines detection based on improved SVM
    Yang Yan-Guang
    Song Qian
    Zhou Zhi-Min
    2006 8TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, VOLS 1-4, 2006, : 1827 - +
  • [39] A Novel Motion Detection Approach Based on the Improved ViBe Algorithm
    Pak Chun-Hyok
    Zhao Hai
    Zhu Hongbo
    Pan Yilin
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 7081 - 7086
  • [40] A Network Covert Timing Channel Detection Method Based on Chaos Theory and Threshold Secret Sharing
    Xie, Jinpu
    Chen, Yonghong
    Wang, Linfan
    Wang, Zhe
    PROCEEDINGS OF 2020 IEEE 4TH INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC 2020), 2020, : 2380 - 2384