TY - GEN
T1 - An approach with two-stage mode to detect cache-based side channel attacks
AU - Yu, Si
AU - Gui, Xiaolin
AU - Lin, Jiancai
PY - 2013
Y1 - 2013
N2 - Side channel attacks, which intend to analyze third party sharing resources responses, has become a significant security threat to cloud, in particular the cache-based side channel attacks. In this paper, to eliminate such a security threat in cloud, based on the observation that the creation of a side channel has certain effects on the resource utilization in both the host and guest, we investigate the detection approach for detecting cache-based side channel attacks, named CSDA. The approach uses the two-stage detection mode which consists of host detection and guest detection, combines shape test and regularity test to extract the attack features from hosts and guests, and uses pattern recognition techniques to distinguish the attack VMs from the legitimate VMs. At last, a series of experiments are conducted, and the experimental results show that CSDA is capable of detecting them in cloud effectively.
AB - Side channel attacks, which intend to analyze third party sharing resources responses, has become a significant security threat to cloud, in particular the cache-based side channel attacks. In this paper, to eliminate such a security threat in cloud, based on the observation that the creation of a side channel has certain effects on the resource utilization in both the host and guest, we investigate the detection approach for detecting cache-based side channel attacks, named CSDA. The approach uses the two-stage detection mode which consists of host detection and guest detection, combines shape test and regularity test to extract the attack features from hosts and guests, and uses pattern recognition techniques to distinguish the attack VMs from the legitimate VMs. At last, a series of experiments are conducted, and the experimental results show that CSDA is capable of detecting them in cloud effectively.
KW - attack detection
KW - cache-based side channel attacks
KW - cloud computing
KW - virtualization security
UR - https://www.scopus.com/pages/publications/84876748582
U2 - 10.1109/ICOIN.2013.6496374
DO - 10.1109/ICOIN.2013.6496374
M3 - 会议稿件
AN - SCOPUS:84876748582
SN - 9781467357401
T3 - International Conference on Information Networking
SP - 186
EP - 191
BT - International Conference on Information Networking 2013, ICOIN 2013
T2 - 27th International Conference on Information Networking, ICOIN 2013
Y2 - 27 January 2013 through 30 January 2013
ER -