首页> 外文会议>Conference on cyber sensing >On Localization Attacks Against Cloud Infrastructure
【24h】

On Localization Attacks Against Cloud Infrastructure

机译:关于针对云基础架构的本地化攻击

获取原文

摘要

One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit(CPU)resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine(VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.
机译:云计算的关键特性之一是设备和位置无关性,使用户无论位置在何处都可以访问系统。由于云计算高度依赖共享资源,因此容易受到网络攻击。在本文中,我们研究了一种本地化攻击,该攻击可使对手利用中央处理单元(CPU)资源来本地化受害者使用的服务器的物理位置。通过通过恶意虚拟机(VM)增加和减少CPU使用率,来自受害VM的响应时间将相应增加和减少。通过这种方式,通过将探测信号嵌入到CPU使用率中,并在来自受害者VM的响应时间中关联相同的模式,对手就可以找到受害者VM的位置。为了确定攻击的准确性,我们研究了时域和频域的特征。我们进行理论和实验研究,以证明这种攻击的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号