Detecting Hidden Shared Dependencies via Covert Channels
نویسنده
چکیده
Designs for high availability using redundant subsystems rely on the independence of replicated subsystems to work. However, increasing prevalence of multiple administrative domains in distributed systems obscures dependency information. In this paper, we propose a new technique to detect hidden shared dependencies. We utilize the insight that shared resources often give rise to covert channels that can then be used to detect the presence of the shared resource itself. Through experiments, we show that the technique is feasible for an important subclass of dependencies shared hidden bottlenecks.
منابع مشابه
An Effective Covert Timing Channels Detection: Support Vector Machine & Hyperbolic Hopfield Neural Network
A network covert channel is a mechanism that can be used to leak information across a network in violation of a security policy and in a manner that can be difficult to detect. Detecting and preventing covert channels is particularly important for multilevel security systems in which processes working with classified information may leak information to processes with a lower classification leve...
متن کاملA novel covert channel detection method in cloud based on XSRM and improved event association algorithm
Covert channel is a major threat to the information system security and commonly found in operating systems, especially in cloud computing environment. Owing to the characteristics in cloud computing environment such as resources sharing and logic boundaries, covert channels become more varied and difficult to find. Focusing on those problems, this paper presents a universal method for detectin...
متن کاملC2Detector: a covert channel detection framework in cloud computing
Cloud computing is becoming increasingly popular because of the dynamic deployment of computing service. Another advantage of cloud is that data confidentiality is protected by the cloud provider with the virtualization technology. However, a covert channel can break the isolation of the virtualization platform and leak confidential information without letting it known by virtual machines. In t...
متن کاملMethods of IPD normalization to counteract IP timing covert channels
Covert channels are used for information transmission in a manner that is not intended for communication and is difficult to detect. We propose a technique to prevent the information leakage via IP covert timing channels by inter-packet delays normalization in the process of packets sending. Recommendations for using the counteraction methods and choosing parameters were given. The advantage of...
متن کاملDesign of Transport Layer Based Hybrid Covert Channel Detection Engine
Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitim...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008