Real-Time Covert Timing Channel Detection in Networked Virtual Environments

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Despite extensive research on malware and Trojan horses, covert channels are still among the top computer security threats. These attacks, which are launched using specially-crafted content or by manipulating timing characteristics, transmit sensitive information to adversaries while remaining undetected. Current detection approaches typically analyze deviations from legitimate network traffic statistics. These approaches, however, are not applicable to highly dynamic, noisy environments, such as cloud computing environments, because they rely heavily on historical traffic and tedious model training. To address these challenges, we present a real-time, wavelet-based approach for detecting covert timing channels. The novelty of the approach comes from leveraging a secure virtual machine to mimic a vulnerable virtual machine. A key advantage is that the detection approach does not require historical traffic data. Experimental results demonstrate that the approach exhibits good overall performance, including a high detection rate and a low false positive rate. © IFIP International Federation for Information Processing 2013.

Cite

CITATION STYLE

APA

Liu, A., Chen, J., & Wechsler, H. (2013). Real-Time Covert Timing Channel Detection in Networked Virtual Environments. In IFIP Advances in Information and Communication Technology (Vol. 410, pp. 273–288). Springer New York LLC. https://doi.org/10.1007/978-3-642-41148-9_19

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free