Covert Channels Implementation and Detection in Virtual Environments

被引:1
|
作者
Mihai, Irina [1 ]
Leordeanu, Catalin [1 ]
Patrascu, Alecsandru [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Bucharest, Romania
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
关键词
Covert channels; Security; Virtual machines; Container based virtualization;
D O I
10.1007/978-3-319-64701-2_44
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It can be said that a system is as secure as its most insecure component. Since the most important component of Cloud is virtualization, breaking it would mean breaking the Cloud. This is what covert channels are capable of "Covert channels" represent a concept as actual as it is old; they make use of shared resources, or even the network, to send confidential information. They are difficult to detect, especially since nowadays servers host thousands of virtual machines. However, this is not impossible. This paper demonstrates that covert channels, although a real threat to the Cloud, may still be detected with high accuracy. We also present in depth a way in which data can be transmitted between virtual machines, using the CPU load-based technique.
引用
收藏
页码:575 / 584
页数:10
相关论文
共 50 条
  • [1] Towards Covert Channels in Cloud Environments: A Study of Implementations in Virtual Networks
    Spiekermann, Daniel
    Keller, Joerg
    Eggendorfer, Tobias
    DIGITAL FORENSICS AND WATERMARKING, 2017, 10431 : 248 - 262
  • [2] REAL-TIME DETECTION OF COVERT CHANNELS IN HIGHLY VIRTUALIZED ENVIRONMENTS
    Liu, Anyi
    Chen, Jim
    Yang, Li
    CRITICAL INFRASTRUCTURE PROTECTION V, 2011, 367 : 151 - 164
  • [3] On covert channels between virtual machines
    Ranjith, P.
    Priya, Chandran
    Shalini, Kaleeswaran
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2012, 8 (03): : 85 - 97
  • [4] REAL-TIME COVERT TIMING CHANNEL DETECTION IN NETWORKED VIRTUAL ENVIRONMENTS
    Liu, Anyi
    Chen, Jim
    Wechsler, Harry
    ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 273 - 288
  • [5] Detection of Covert Channels in TCP Retransmissions
    Zillien, Sebastian
    Wendzel, Steffen
    SECURE IT SYSTEMS, 2018, 11252 : 203 - 218
  • [6] Detection of DNS Based Covert Channels
    Sheridan, Stephen
    Keane, Anthony
    PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), 2015, : 267 - 275
  • [7] Collaborative Detection of Covert Storage Channels
    Song, Heng
    Li, Xiangyang
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 515 - 520
  • [8] Survey on covert channels in virtual machines and cloud computing
    Betz, Johann
    Westhoff, Dirk
    Mueller, Guenter
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (06):
  • [9] Detection of Covert Channels over ICMP Protocol
    Sayadi, Sirine
    Abbes, Tarek
    Bouhoula, Adel
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1247 - 1252
  • [10] TCP Covert Timing Channels: Design and Detection
    Luo, Xiapu
    Chan, Edmond W. W.
    Chang, Rocky K. C.
    2008 IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS & NETWORKS WITH FTCS & DCC, 2008, : 420 - 429