메뉴 건너뛰기




Volumn , Issue , 2012, Pages 1-12

Detecting co-residency with active traffic analysis techniques

Author keywords

Cloud Security; Covert Channel; Traffic Analysis

Indexed keywords

CLOUD PROVIDERS; COVERT CHANNELS; CUSTOMER INFORMATION; DESIGN OF HARDWARES; HARDWARE CONFIGURATIONS; HYPERVISOR; LOAD MEASUREMENTS; NETWORK FLOWS; PHYSICAL RESOURCES; SIDE-CHANNEL; SYSTEM LOADS; THIRD PARTIES; TRAFFIC ANALYSIS; TRAFFIC-ANALYSIS TECHNIQUES; UNIVERSITY OF OREGON; VIRTUAL MACHINES; VIRTUALIZATIONS;

EID: 84869782980     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2381913.2381915     Document Type: Conference Paper
Times cited : (86)

References (47)
  • 1
    • 84870722474 scopus 로고    scopus 로고
    • Amazon EC2 Service Level Agreement
    • Amazon EC2 Service Level Agreement. http://aws.amazon.com/ec2-sla/.
  • 11
    • 77950825753 scopus 로고    scopus 로고
    • Online sketching of network flows for real-time stepping-stone detection
    • Washington, DC, USA, IEEE Computer Society
    • B. Coskun and N. Memon. Online sketching of network flows for real-time stepping-stone detection. In Proc. 2009 Annual Computer Security Applications Conf., ACSAC '09, pages 473-483, Washington, DC, USA, 2009. IEEE Computer Society.
    • (2009) Proc. 2009 Annual Computer Security Applications Conf., ACSAC '09 , pp. 473-483
    • Coskun, B.1    Memon, N.2
  • 12
    • 84870713306 scopus 로고    scopus 로고
    • CVE-2007-4993. pygrub (tools/pygrub/src/grubconf.py) in xen 3.0.3
    • CVE-2007-4993. pygrub (tools/pygrub/src/grubconf.py) in xen 3.0.3. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2007-4993.
  • 13
    • 84870668999 scopus 로고    scopus 로고
    • CVE-2007-5497. Multiple integer overflows in libext2fs
    • CVE-2007-5497. Multiple integer overflows in libext2fs. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2007-5497.
  • 14
    • 84870675019 scopus 로고    scopus 로고
    • CVE-2010-2240. The doanonymouspage function in mm/memory.c
    • CVE-2010-2240. The doanonymouspage function in mm/memory.c. http://cve.mitre.org/cgibin/cvename.cgi?name=CVE-2010-2240.
  • 15
    • 84863391249 scopus 로고    scopus 로고
    • SR-IOV networking in xen: Architecture, design and implementation
    • Berkeley, CA, USA, USENIX Association
    • Y. Dong, Z. Yu, and G. Rose. SR-IOV Networking in Xen: Architecture, Design and Implementation. In Proc. First Conf. on I/O Virtualization, WIOV'08, page 10, Berkeley, CA, USA, 2008. USENIX Association.
    • (2008) Proc. First Conf. on I/O Virtualization, WIOV'08 , pp. 10
    • Dong, Y.1    Yu, Z.2    Rose, G.3
  • 16
    • 82155203093 scopus 로고    scopus 로고
    • Opportunistic flooding to improve TCP transmit performance in virtualized clouds
    • New York, NY, USA, ACM
    • S. Gamage, A. Kangarlou, R. R. Kompella, and D. Xu. Opportunistic Flooding to Improve TCP Transmit Performance in Virtualized Clouds. In Proc. 2nd ACM Symp. on Cloud Computing, SOCC '11, pages 1-14, New York, NY, USA, 2011. ACM.
    • (2011) Proc. 2nd ACM Symp. on Cloud Computing, SOCC '11 , pp. 1-14
    • Gamage, S.1    Kangarlou, A.2    Kompella, R.R.3    Xu, D.4
  • 19
    • 70449709794 scopus 로고    scopus 로고
    • Virtualization with KVM
    • Feb
    • I. Habib. Virtualization with KVM. Linux Journal, Feb. 2008.
    • (2008) Linux Journal
    • Habib, I.1
  • 25
    • 82655169619 scopus 로고    scopus 로고
    • Technical report, Intel Corporation
    • P. Kutch. PCI-SIG SR-IOV Primer. Technical report, Intel Corporation, 2011.
    • (2011) PCI-SIG SR-IOV Primer
    • Kutch, P.1
  • 33
    • 33751040560 scopus 로고    scopus 로고
    • On the secrecy of timing-based active watermarking trace-back techniques
    • Oakland, CA, USA
    • P. Peng, P. Ning, and D. S. Reeves. On the Secrecy of Timing-Based Active Watermarking Trace-Back Techniques. In Proc. 2006 IEEE Symp. on Security and Privacy, Oakland, CA, USA, 2006.
    • (2006) Proc. 2006 IEEE Symp. on Security and Privacy
    • Peng, P.1    Ning, P.2    Reeves, D.S.3
  • 34
    • 0000564455 scopus 로고
    • The kolmogorov-Smirnov goodness-of-fit statistic with discrete and grouped data
    • A. N. Pettitt and M. A. Stephens. The Kolmogorov-Smirnov Goodness-of-Fit Statistic with Discrete and Grouped Data. Technometrics, 19(2):205-210, 1977.
    • (1977) Technometrics , vol.19 , Issue.2 , pp. 205-210
    • Pettitt, A.N.1    Stephens, M.A.2
  • 38
    • 80053503082 scopus 로고    scopus 로고
    • Runtime measurements in the cloud: Observing, analyzing, and reducing variance
    • Sept
    • J. Schad, J. Dittrich, and J.-A. Quiané-Ruiz. Runtime Measurements in the Cloud: Observing, Analyzing, and Reducing Variance. Proc. VLDB Endowment, 3(1-2):460-471, Sept. 2010.
    • (2010) Proc. VLDB Endowment , vol.3 , Issue.1-2 , pp. 460-471
    • Schad, J.1    Dittrich, J.2    Quiané-Ruiz, J.-A.3
  • 41
    • 84870655070 scopus 로고    scopus 로고
    • VMSA-2008-0008. VMware ACE, VMware Fusion Resolve Critical Security Issues
    • VMSA-2008-0008. Updates to VMware Workstation, VMware Player, VMware ACE, VMware Fusion Resolve Critical Security Issues. http://www.vmware.com/security/ advisories/VMSA-2008-0008.html.
    • Updates to VMware Workstation, VMware Player
  • 42
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • Oakland, CA, USA, May
    • X. Wang, S. Chen, and S. Jajodia. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. In Proc. 2007 IEEE Symp. on Security and Privacy, Oakland, CA, USA, May 2007.
    • (2007) Proc. 2007 IEEE Symp. on Security and Privacy
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 43
    • 2442556704 scopus 로고    scopus 로고
    • Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
    • New York, NY, USA, ACM
    • X. Wang and D. S. Reeves. Robust Correlation of Encrypted Attack Traffic Through Stepping Stones by Manipulation of Interpacket Delays. In Proc. 10th ACM conference on Computer and communications security, CCS '03, pages 20-29, New York, NY, USA, 2003. ACM.
    • (2003) Proc. 10th ACM Conference on Computer and Communications Security, CCS '03 , pp. 20-29
    • Wang, X.1    Reeves, D.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.