University of Jyväskylä | JYX Digital Repository

  • English  | Give feedback |
    • suomi
    • English
 
  • Login
JavaScript is disabled for your browser. Some features of this site may not work without it.
View Item 
  • JYX
  • Artikkelit
  • Informaatioteknologian tiedekunta
  • View Item
JYX > Artikkelit > Informaatioteknologian tiedekunta > View Item

On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds

ThumbnailFinal Draft
View/Open
429.0 Kb

Downloads:  
Show download detailsHide download details  
Zolotukhin, M., Ivannikova, E., & Hämäläinen, T. (2017). On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds. In O. Galinina, S. Andreev, S. Balandin, & Y. Koucheryavy (Eds.), NEW2AN 2017, ruSMART 2017, NsCC 2017 : Internet of Things, Smart Spaces, and Next Generation Networks and Systems (pp. 235-246). Springer International Publishing. Lecture Notes in Computer Science, 10531. https://doi.org/10.1007/978-3-319-67380-6_22
Published in
Lecture Notes in Computer Science
Authors
Zolotukhin, Mikhail |
Ivannikova, Elena |
Hämäläinen, Timo
Editors
Galinina, Olga |
Andreev, Sergey |
Balandin, Sergey |
Koucheryavy, Yevgeni
Date
2017
Discipline
TietotekniikkaMathematical Information Technology
Copyright
© Springer International Publishing AG 2017. This is a final draft version of an article whose final and definitive form has been published by Springer. Published in this repository with the kind permission of the publisher.

 
Modern cloud environments allow users to consume computational and storage resources in the form of virtual machines. Even though machines running on the same cloud server are logically isolated from each other, a malicious customer can create various side channels to obtain sensitive information from co-located machines. In this study, we concentrate on timely detection of intentional co-residence attempts in cloud environments that utilize software-defined networking. SDN enables global visibility of the network state which allows the cloud provider to monitor and extract necessary information from each flow in every virtual network in online mode. We analyze the extracted statistics on different levels in order to find anomalous patterns. The detection results obtained show us that the co-residence verification attack can be detected with the methods that are usually employed for botnet analysis.
Publisher
Springer International Publishing
Parent publication ISBN
978-3-319-67379-0
Conference
International Conference on Next Generation Wired/Wireless Advanced Networks and Systems
Is part of publication
NEW2AN 2017, ruSMART 2017, NsCC 2017 : Internet of Things, Smart Spaces, and Next Generation Networks and Systems
ISSN Search the Publication Forum
0302-9743
Keywords
cloud environments virtual networks co-residence detection pilvipalvelut tietoturva
DOI
https://doi.org/10.1007/978-3-319-67380-6_22
URI

http://urn.fi/URN:NBN:fi:jyu-201710304090

Publication in research information system

https://converis.jyu.fi/converis/portal/detail/Publication/27214976

Metadata
Show full item record
Collections
  • Informaatioteknologian tiedekunta [1859]

Related items

Showing items with similar title or keywords.

  • A Network-Based Framework for Mobile Threat Detection 

    Kumar, Sanjay; Viinikainen, Ari; Hämäläinen, Timo (IEEE, 2018)
    Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, ...
  • Unsupervised network intrusion detection systems for zero-day fast-spreading network attacks and botnets 

    Vahdani Amoli, Payam (University of Jyväskylä, 2015)
    Today, the occurrence of zero-day and complex attacks in high-speed networks is increasingly common due to the high number vulnerabilities in the cyber world. As a result, intrusions become more sophisticated and fast ...
  • Detection of distributed denial-of-service attacks in encrypted network traffic 

    Hyvärinen, Mikko (2016)
    Tausta: Hajautetut palvelunestohyökkäykset ovat jo kaksi vuosikymmentä vanhoja. Useita strategioita on kehitetty taistelemaan niiden kasvavaa määrää vastaan vuosien varrella. Sovelluskerroksen protokollien hyökkäykset ...
  • Reducing the Time to Detect Cyber Attacks : Combining Attack Simulation With Detection Logic 

    Myllyla, Juuso; Costin, Andrei (FRUCT Oy, 2021)
    Cyber attacks have become harder to detect, causing the average detection time of a successful data breach to be over six months and typically costing the target organization nearly four million dollars. The attacks are ...
  • IoT -based adversarial attack's effect on cloud data platform services in a smart building context 

    Vähäkainu, Petri; Lehto, Martti; Kariluoto, Antti (Academic Conferences International, 2020)
    IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's ...
  • Browse materials
  • Browse materials
  • Articles
  • Conferences and seminars
  • Electronic books
  • Historical maps
  • Journals
  • Tunes and musical notes
  • Photographs
  • Presentations and posters
  • Publication series
  • Research reports
  • Research data
  • Study materials
  • Theses

Browse

All of JYXCollection listBy Issue DateAuthorsSubjectsPublished inDepartmentDiscipline

My Account

Login

Statistics

View Usage Statistics
  • How to publish in JYX?
  • Self-archiving
  • Publish Your Thesis Online
  • Publishing Your Dissertation
  • Publication services

Open Science at the JYU
 
Data Protection Description

Accessibility Statement

Unless otherwise specified, publicly available JYX metadata (excluding abstracts) may be freely reused under the CC0 waiver.
Open Science Centre