Cloud fingerprinting: using clock skews to determine co-location of virtual machines
| dc.contributor.advisor | Xie, Geoffrey G. | |
| dc.contributor.advisor | Kolsch, Mathias | |
| dc.contributor.author | Wasek, Christopher J. | |
| dc.contributor.department | Computer Science (CS) | |
| dc.date.accessioned | 2016-11-02T17:18:13Z | |
| dc.date.available | 2016-11-02T17:18:13Z | |
| dc.date.issued | 2016-09 | |
| dc.description.abstract | Cloud computing has quickly revolutionized computing practices of organizations, to include the Department of Defense. However, security concerns over co-location attacks have arisen from the consolidation inherent in virtualization and from physical hardware hosting virtual machines for multiple businesses and organizations. Current cloud security methods, such as Amazon's Virtual Private Cloud, have evolved defenses against most of the well-known fingerprinting and mapping methods in order to prevent malicious users from determining virtual machine co-location on the same hardware. Our solution to co-locating virtual machines unhindered was to derive their clock skews, or the temporal deviation of the system clock over time. Capturing normal TCP traffic to analyze timestamps from a virtual machine in the cloud, our results were inconclusive in demonstrating that co-located virtual machines will have similar clock skews due to large, inconsistent packet delays. Our research demonstrates a potential vulnerability in cloud defenses so that cloud users and providers can take appropriate steps to prevent malicious co-location attacks. | en_US |
| dc.description.distributionstatement | Approved for public release; distribution is unlimited. | |
| dc.description.recognition | Outstanding Thesis | |
| dc.description.service | Lieutenant Commander, United States Navy | en_US |
| dc.description.uri | http://archive.org/details/cloudfingerprint1094550503 | |
| dc.identifier.uri | https://hdl.handle.net/10945/50503 | |
| dc.publisher | Monterey, CA; Naval Postgraduate School | |
| dc.relation.ispartofseries | NPS Outstanding Theses and Dissertations | |
| dc.rights | This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. | en_US |
| dc.subject.author | cloud | en_US |
| dc.subject.author | TCP timestamps | en_US |
| dc.subject.author | clock skews | en_US |
| dc.subject.author | side-channel attacks | en_US |
| dc.subject.author | virtual machines | en_US |
| dc.subject.author | VM co-location | en_US |
| dc.subject.author | finger-printing | en_US |
| dc.title | Cloud fingerprinting: using clock skews to determine co-location of virtual machines | en_US |
| dc.type | Thesis | en_US |
| dspace.entity.type | Publication | |
| etd.thesisdegree.discipline | Computer Science | en_US |
| etd.thesisdegree.grantor | Naval Postgraduate School | en_US |
| etd.thesisdegree.level | Masters | en_US |
| etd.thesisdegree.name | Master of Science in Computer Science | en_US |
| relation.isDepartmentOfPublication | 67864e54-711d-4c0a-a6d4-439a011f2bd1 | |
| relation.isDepartmentOfPublication.latestForDiscovery | 67864e54-711d-4c0a-a6d4-439a011f2bd1 | |
| relation.isSeriesOfPublication | c5e66392-520c-4aaf-9b4f-370ce82b601f | |
| relation.isSeriesOfPublication.latestForDiscovery | c5e66392-520c-4aaf-9b4f-370ce82b601f |
Files
Original bundle
1 - 1 of 1
