Covert channels implementation and detection in virtual environments

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

It can be said that a system is as secure as its most insecure component. Since the most important component of Cloud is virtualization, breaking it would mean breaking the Cloud. This is what covert channels are capable of “Covert channels” represent a concept as actual as it is old; they make use of shared resources, or even the network, to send confidential information. They are difficult to detect, especially since nowadays servers host thousands of virtual machines. However, this is not impossible. This paper demonstrates that covert channels, although a real threat to the Cloud, may still be detected with high accuracy. We also present in depth a way in which data can be transmitted between virtual machines, using the CPU load-based technique.

Cite

CITATION STYLE

APA

Mihai, I., Leordeanu, C., & Pătraşcu, A. (2017). Covert channels implementation and detection in virtual environments. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10394 LNCS, pp. 575–584). Springer Verlag. https://doi.org/10.1007/978-3-319-64701-2_44

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free