Covert Channels Implementation and Detection in Virtual Environments

被引:1
|
作者
Mihai, Irina [1 ]
Leordeanu, Catalin [1 ]
Patrascu, Alecsandru [1 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Bucharest, Romania
来源
NETWORK AND SYSTEM SECURITY | 2017年 / 10394卷
关键词
Covert channels; Security; Virtual machines; Container based virtualization;
D O I
10.1007/978-3-319-64701-2_44
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
It can be said that a system is as secure as its most insecure component. Since the most important component of Cloud is virtualization, breaking it would mean breaking the Cloud. This is what covert channels are capable of "Covert channels" represent a concept as actual as it is old; they make use of shared resources, or even the network, to send confidential information. They are difficult to detect, especially since nowadays servers host thousands of virtual machines. However, this is not impossible. This paper demonstrates that covert channels, although a real threat to the Cloud, may still be detected with high accuracy. We also present in depth a way in which data can be transmitted between virtual machines, using the CPU load-based technique.
引用
收藏
页码:575 / 584
页数:10
相关论文
共 50 条
  • [31] Efficient and Fast Detection of Covert Channels using Mutation Analysis
    Ennahbaoui, Mohammed
    El Hajji, Said
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 417 - 434
  • [32] Network based detection of passive covert channels in TCP/IP
    Tumoian, E
    Anikeev, M
    LCN 2005: 30TH CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2005, : 802 - 807
  • [33] Construction of the covert channels
    Grusho, A
    Timonina, E
    COMPUTER NETWORK SECURITY, 2003, 2776 : 428 - 431
  • [34] Covert Channels on GPGPUs
    Naghibijouybari, Hoda
    Abu-Ghazaleh, Nael
    IEEE COMPUTER ARCHITECTURE LETTERS, 2017, 16 (01) : 22 - 25
  • [35] Keyboards and covert channels
    Shah, Gaurav
    Molina, Andres
    Blaze, Matt
    USENIX ASSOCIATION PROCEEDINGS OF THE 15TH USENIX SECURITY SYMPOSIUM, 2006, : 59 - +
  • [36] COVERT CHANNELS IN LANS
    GIRLING, CG
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 1987, 13 (02) : 292 - 296
  • [37] An Entropy-based Method for Detection of Covert Channels over LTE
    Wang, Zukui
    Huang, Liusheng
    Yang, Wei
    He, Zhiqiang
    PROCEEDINGS OF THE 2018 IEEE 22ND INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN ((CSCWD)), 2018, : 872 - 877
  • [38] Covert Communication Based on Non-ideal Detection of Overt Channels
    Zhao, Xinyu
    Wang, Danyang
    Li, Zan
    Qian, Lei
    Li, Chenxi
    Zhang, Ning
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 1908 - 1913
  • [39] A generalized detection framework for covert timing channels based on perceptual hashing
    Zhuang, Xiaolong
    Chen, Yonghong
    Tian, Hui
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2024, 35 (05)
  • [40] Protocol-independent Detection of "Messaging Ordering" Network Covert Channels
    Wendzel, Steffen
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,