C2Hunter

Detection and mitigation of covert channels in data centers

Jingzheng Wu, Yanjun Wu, Bei Guan, Yuqi Lin, Samee U. Khan, Nasro Min-Allah, Yongji Wang

Research output: Chapter in Book/Report/Conference proceedingChapter

2 Citations (Scopus)

Abstract

Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].

Original languageEnglish
Title of host publicationHandbook on Data Centers
PublisherSpringer New York
Pages961-996
Number of pages36
ISBN (Electronic)9781493920921
ISBN (Print)9781493920914
DOIs
Publication statusPublished - 1 Jan 2015
Externally publishedYes

Fingerprint

Cloud computing
Computer monitors
Computer operating systems
Computer hardware
Computer systems
Internet
Virtual machine
Virtualization

Keywords

  • Architecture
  • Control
  • Covert channel
  • Monitoring
  • Security
  • Software

ASJC Scopus subject areas

  • Computer Science(all)
  • Engineering(all)

Cite this

Wu, J., Wu, Y., Guan, B., Lin, Y., Khan, S. U., Min-Allah, N., & Wang, Y. (2015). C2Hunter: Detection and mitigation of covert channels in data centers. In Handbook on Data Centers (pp. 961-996). Springer New York. https://doi.org/10.1007/978-1-4939-2092-1_32

C2Hunter : Detection and mitigation of covert channels in data centers. / Wu, Jingzheng; Wu, Yanjun; Guan, Bei; Lin, Yuqi; Khan, Samee U.; Min-Allah, Nasro; Wang, Yongji.

Handbook on Data Centers. Springer New York, 2015. p. 961-996.

Research output: Chapter in Book/Report/Conference proceedingChapter

Wu, J, Wu, Y, Guan, B, Lin, Y, Khan, SU, Min-Allah, N & Wang, Y 2015, C2Hunter: Detection and mitigation of covert channels in data centers. in Handbook on Data Centers. Springer New York, pp. 961-996. https://doi.org/10.1007/978-1-4939-2092-1_32
Wu J, Wu Y, Guan B, Lin Y, Khan SU, Min-Allah N et al. C2Hunter: Detection and mitigation of covert channels in data centers. In Handbook on Data Centers. Springer New York. 2015. p. 961-996 https://doi.org/10.1007/978-1-4939-2092-1_32
Wu, Jingzheng ; Wu, Yanjun ; Guan, Bei ; Lin, Yuqi ; Khan, Samee U. ; Min-Allah, Nasro ; Wang, Yongji. / C2Hunter : Detection and mitigation of covert channels in data centers. Handbook on Data Centers. Springer New York, 2015. pp. 961-996
@inbook{62857a46d8ea4c3897d022e98658b214,
title = "C2Hunter: Detection and mitigation of covert channels in data centers",
abstract = "Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].",
keywords = "Architecture, Control, Covert channel, Monitoring, Security, Software",
author = "Jingzheng Wu and Yanjun Wu and Bei Guan and Yuqi Lin and Khan, {Samee U.} and Nasro Min-Allah and Yongji Wang",
year = "2015",
month = "1",
day = "1",
doi = "10.1007/978-1-4939-2092-1_32",
language = "English",
isbn = "9781493920914",
pages = "961--996",
booktitle = "Handbook on Data Centers",
publisher = "Springer New York",

}

TY - CHAP

T1 - C2Hunter

T2 - Detection and mitigation of covert channels in data centers

AU - Wu, Jingzheng

AU - Wu, Yanjun

AU - Guan, Bei

AU - Lin, Yuqi

AU - Khan, Samee U.

AU - Min-Allah, Nasro

AU - Wang, Yongji

PY - 2015/1/1

Y1 - 2015/1/1

N2 - Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].

AB - Data centers provides both the applications, systems software and the hardware as services over the Internet, which is named cloud computing [1-3]. It is core infrastructure of cloud computing, supporting dynamic deployment and elastic resource management. With the powerful computing and storing capabilities, cloud computing has become increasingly popular [4, 5]. The fundamental mechanism of cloud is virtualization which allows virtual machines (VM) instantiate stand-alone operating systems on demand based on a software layer called virtual machine monitor (VMM) or hypervisor [6]. Although the virtualization technology provides strong isolation for the cloud, security and privacy are always the open problems [7]. Some of the problems are essentially traditional web application and data-hosting ones, e.g., phishing, downtime, data loss, and password weakness. One of the new problems introduced by the shared environment to cloud computing is the covert channel attack [8]. By this way, information is leaked from the data centers and meanwhile the security provided by isolation is breaken down [9, 10].

KW - Architecture

KW - Control

KW - Covert channel

KW - Monitoring

KW - Security

KW - Software

UR - http://www.scopus.com/inward/record.url?scp=84945122418&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84945122418&partnerID=8YFLogxK

U2 - 10.1007/978-1-4939-2092-1_32

DO - 10.1007/978-1-4939-2092-1_32

M3 - Chapter

SN - 9781493920914

SP - 961

EP - 996

BT - Handbook on Data Centers

PB - Springer New York

ER -