16,295 Hits in 5.0 sec

A Measurement Study on Co-residence Threat inside the Cloud

Zhang Xu, Haining Wang, Zhenyu Wu
2015 USENIX Security Symposium  
On the other hand, we demonstrate a new approach to achieving co-residence in VPC, indicating that co-residence threat still exists in the cloud.  ...  On one hand, our measurement shows that VPC is widely used and can indeed suppress co-residence threat.  ...  Acknowledgement We would like to thank our shepherd Chris Grier and the anonymous reviewers for their insightful and detailed comments. This work was partially supported by ONR grant N00014-13-1-0088.  ... 
dblp:conf/uss/XuWW15 fatcat:os2hszaurjc3jbkjxh53egr7cq

Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) [chapter]

Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia
2020 Lecture Notes in Computer Science  
In this paper, we take the first step toward modeling and mitigating security threats unique to NFV. Specifically, we model both cross-layer and co-residency attacks on the NFV stack.  ...  As NFV relies on virtualization, and as an NFV stack typically involves several levels of abstraction and multiple co-resident tenants, this new technology also unavoidably leads to new security threats  ...  The authors thank the anonymous reviewers for their valuable comments.  ... 
doi:10.1007/978-3-030-49669-2_1 fatcat:aon2pyvkdfhebpdwjueqr4k6ge

Security Challenges from Abuse of Cloud Service Threat

Ishrat Ahmad, et al.
2019 International Journal of Computing and Digital Systems  
The study has identified the potential challenges, as BotNet, BotCloud, Shared Technology Vulnerability and Malicious Insiders, from Abuse of cloud service threat.  ...  The paper provides a useful introduction to the rising security issues of Abuse of cloud service threat, which has no standard security measures to mitigate its risks and vulnerabilities.  ...  with counter measure DoS attack was introduced [33] and Game Theory defense mechanisms to stop co-residence DoS attacks [34] .  ... 
doi:10.12785/ijcds/080103 fatcat:zlkr7f7owve3jnydbozyt7fyly

If you want to know about a hunter, study his prey: detection of network based attacks on KVM based cloud environments

Nikolaos Pitropakis, Dimitra Anastasopoulou, Aggelos Pikrakis, Costas Lambrinoudakis
2014 Journal of Cloud Computing: Advances, Systems and Applications  
This paper proposes a methodology for detecting the co-residency and network stressing attacks in the kernel layer of a Kvm-based cloud environment, using an implementation of the Smith-Waterman genetic  ...  In addition to this revolution, several security matters emerged and especially the confrontation of malicious insiders.  ...  Acknowledgements We sincerely thank all the researchers of the Systems Security Laboratory at University of Piraeus for the inspiration they provide and their useful comments throughout our research.  ... 
doi:10.1186/s13677-014-0020-6 fatcat:4hw2d4hfnjeyffkx45u2hmt3bu

Classifying malware attacks in IaaS cloud environments

Noëlle Rakotondravony, Benjamin Taubmann, Waseem Mandarawi, Eva Weishäupl, Peng Xu, Bojan Kolosnjaji, Mykolai Protsenko, Hermann de Meer, Hans P. Reiser
2017 Journal of Cloud Computing: Advances, Systems and Applications  
This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud.  ...  Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective  ...  Acknowledgements The research leading to these results was supported by the "Bavarian State Ministry of Education, Science and the Arts" as part of the FORSEC research association.  ... 
doi:10.1186/s13677-017-0098-8 fatcat:raimhnl4rrbn5fwhe5ov5idupy

Securing the Cloud: Threats, Attacks and Mitigation Techniques

Mohammed M. Alani
2014 Journal of Advanced Computer Science & Technology  
This paper is aimed to present information about the most current threats and attacks on cloud computing, as well as security measures.  ...  The paper discusses threats and attacks that are most effective on cloud computing such as data breach, data loss, service traffic hijacking..etc.  ...  In co-resident DoS attack, the attacker rents a VM inside the public cloud and conducts the DoS from the rented VM onto another VM within the same node.  ... 
doi:10.14419/jacst.v3i2.3588 fatcat:zw5nrmf2hrevvo6glzi6cl6cze

COMS: Customer Oriented Migration Service

Kai Huang, Xing Gao, Fengwei Zhang, Jidong Xiao
2017 2017 IEEE 10th International Conference on Cloud Computing (CLOUD)  
Our evaluation results show that these modules could either bring performance benefit to cloud customers, or mitigate security threats in the cloud environment.  ...  Cloud customers have no say on this: They can not initiate a migration, and they do not even know whether or not their virtual machines have been migrated.  ...  For example, in [8] , the authors show that the time spent to achieve co-residence with a specific target VM in a public cloud is above one hour.  ... 
doi:10.1109/cloud.2017.94 dblp:conf/IEEEcloud/HuangGZX17 fatcat:fp2szmj5cnd6ddtpwlzqgtajom

Virtualization-Based Security Techniques on Mobile Cloud Computing: Research Gaps and Challenges

Boubakeur Annane, Osman Ghazali
2019 International Journal of Interactive Mobile Technologies  
Currently, the eyes of the security expert's community turned towards the virtualization-based security technique either on the Cloud or on the mobile devices.  ...  While cloud computing offers a vast computing resources services.  ...  However, the authors have only studied one type of attacks: co-resident attack occurred only inside one host and not distributed on different hosts.  ... 
doi:10.3991/ijim.v13i04.10515 fatcat:hhf7lpny2feoblfesbxsfpop2i

A Placement Vulnerability Study in Multi-tenant Public Clouds [article]

Venkatanathan Varadarajan, Yinqian Zhang, Thomas Ristenpart and Michael Swift
2015 arXiv   pre-print
Although there have been numerous works on side-channel attacks, there have been no studies on placement vulnerabilities in public clouds since the adoption of stronger isolation technologies such as Virtual  ...  We use our new co-residence tests and multiple customer accounts to launch VM instances under different strategies that seek to maximize the likelihood of co-residency.  ...  Acknowledgments This work was funded by the National Science Foundation under grants CNS-1330308, CNS-1546033 and CNS-1065134. Swift has a significant financial interest in Microsoft Corp.  ... 
arXiv:1507.03114v1 fatcat:opgteew3c5eafcxo2oicrbfdpq

Detecting co-residency with active traffic analysis techniques

Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin Butler
2012 Proceedings of the 2012 ACM Workshop on Cloud computing security workshop - CCSW '12  
Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat -unless perfect isolation is provided by the virtual hypervisor, there exists the possibility  ...  This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance.  ...  Malony, Chris Hoge, and the ACISS staff for their assistance and support.  ... 
doi:10.1145/2381913.2381915 dblp:conf/ccs/BatesMPPVB12 fatcat:2fdzbumsbrcptjoldapjnbua6i

Extensive Study of Cloud Computing Technologies, Threats and Solutions Prospective

Mwaffaq Abu-Alhaija, Nidal M. Turab, AbdelRahman Hamza
2022 Computer systems science and engineering  
IaaS is one of the basis of cloud virtualization. Recently, security issues are also gradually emerging with virtualization of cloud computing.  ...  Different security aspects of cloud virtualization will be explored in this research paper, security recognizing potential threats or attacks that exploit these vulnerabilities, and what security measures  ...  ., measuring the frequency at which a VM is paused.  ... 
doi:10.32604/csse.2022.019547 fatcat:hgxqvutbrfh5nivblmsuibasnu


Tianwei Zhang, Ruby B. Lee
2015 Proceedings of the 42nd Annual International Symposium on Computer Architecture - ISCA '15  
This is complicated by the customer not knowing where his VM is executing, and on the semantic gap between what the customer wants to know versus what can be measured in the cloud.  ...  We show a concrete implementation of property-based attestation and a full prototype based on the OpenStack open source cloud software.  ...  Pramod Jamkhedkar, now at AT&T Labs, for invaluable help with setting up the OpenStack testbed, and the anonymous reviewers for their feedback on this work.  ... 
doi:10.1145/2749469.2750422 dblp:conf/isca/ZhangL15 fatcat:w5esq56yazhuflfwf2r3qcenne

Security and Privacy in Cloud Computing

Zhifeng Xiao, Yang Xiao
2013 IEEE Communications Surveys and Tutorials  
Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments.  ...  Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario  ...  ACKNOWLEDGMENT This work is supported in part by The U.S. National Science Foundation (NSF), under grants: CNS-0716211, CCF-0829827, CNS-0737325, and CNS-1059265.  ... 
doi:10.1109/surv.2012.060912.00182 fatcat:nprdqkomn5fvrlxnwvmlvvtati

Hey, you, get off of my cloud

Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
until one is placed co-resident with the target.  ...  Using the Amazon EC2 service as a case study, we show that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs  ...  This work was supported by NSF grants NSF-0433668, CNS-0808907, CNS-0524765, CNS-0627779 and NSF-0829469, AFRL grant FA8750-08-1-0088, and partially supported by a MURI grant administered by the Air Force  ... 
doi:10.1145/1653662.1653687 dblp:conf/ccs/RistenpartTSS09 fatcat:6pcsvygsanhwzng6c2ynyk4l4q

Security Issues and Privacy in Cloud Computing

K Durkesh, Ms.J.R Thresphine
2014 IOSR Journal of Computer Engineering  
Throughout the study at hand, the authors obtain a common goal to provide a comprehensive review of the existing security and privacy issues in cloud environments.  ...  Beginning with these attributes, we present the relationships among them, the vulnerabilities that may be exploited by attackers, the threat models, as well as existing defense strategies in a cloud scenario  ...  A memory disclosure attack is capable of detecting the existence of an application or a file on a co-residing VM by measuring the write access time that differs between reduplicated pages and regular ones  ... 
doi:10.9790/0661-16453956 fatcat:ql3xgf6uxrcqjevdfvafmsg4ui
« Previous Showing results 1 — 15 out of 16,295 results