On detecting co-resident cloud instances using network flow watermarking techniques

被引:62
作者
Bates, Adam [1 ]
Mood, Benjamin [1 ]
Pletcher, Joe [1 ]
Pruse, Hannah [1 ]
Valafar, Masoud [1 ]
Butler, Kevin [1 ]
机构
[1] Univ Oregon, Dept Comp & Informat Sci, Eugene, OR 97405 USA
基金
美国国家科学基金会;
关键词
Cloud security; Traffic analysis; Covert channel;
D O I
10.1007/s10207-013-0210-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
080201 [机械制造及其自动化];
摘要
Virtualization is the cornerstone of the developing third-party compute industry, allowing cloud providers to instantiate multiple virtual machines (VMs) on a single set of physical resources. Customers utilize cloud resources alongside unknown and untrusted parties, creating the co-resident threat-unless perfect isolation is provided by the virtual hypervisor, there exists the possibility for unauthorized access to sensitive customer information through the exploitation of covert side channels. This paper presents co-resident watermarking, a traffic analysis attack that allows a malicious co-resident VM to inject a watermark signature into the network flow of a target instance. This watermark can be used to exfiltrate and broadcast co-residency data from the physical machine, compromising isolation without reliance on internal side channels. As a result, our approach is difficult to defend against without costly underutilization of the physical machine. We evaluate co-resident watermarkingunder a large variety of conditions, system loads and hardware configurations, from a local laboratory environment to production cloud environments (Futuregrid and the University of Oregon's ACISS). We demonstrate the ability to initiate a covert channel of 4 bits per second, and we can confirm co-residency with a target VM instance in 10 s. We also show that passive load measurement of the target and subsequent behavior profiling is possible with this attack. We go on to consider the detectability of co-resident watermarking, extending our scheme to create a subtler watermarking attack by imitating legitimate cloud customer behavior. Our investigation demonstrates the need for the careful design of hardware to be used in the cloud.
引用
收藏
页码:171 / 189
页数:19
相关论文
共 57 条
[1]
[Anonymous], 2011, P 3 ACM WORKSH CLOUD
[2]
[Anonymous], PROC 1ST CONF I O VI
[3]
[Anonymous], CVE20075497
[4]
[Anonymous], AM EL COMP CLOUD EC2
[5]
[Anonymous], CVE20102240
[6]
[Anonymous], 2009, DEP ELECT ENG COMPUT
[7]
[Anonymous], 2006, P 2006 IEEE S SEC PR
[8]
[Anonymous], 2008, P 2008 ACM IEEE C SU
[9]
[Anonymous], 2003, ACM SIGOPS OPERATING
[10]
[Anonymous], P 14 ACM C COMP COMM