Show simple item record

dc.contributor.advisorXie, Geoffrey G.
dc.contributor.advisorKolsch, Mathias
dc.contributor.authorWasek, Christopher J.
dc.dateSep-16
dc.date.accessioned2016-11-02T17:18:13Z
dc.date.available2016-11-02T17:18:13Z
dc.date.issued2016-09
dc.identifier.urihttps://hdl.handle.net/10945/50503
dc.description.abstractCloud computing has quickly revolutionized computing practices of organizations, to include the Department of Defense. However, security concerns over co-location attacks have arisen from the consolidation inherent in virtualization and from physical hardware hosting virtual machines for multiple businesses and organizations. Current cloud security methods, such as Amazon's Virtual Private Cloud, have evolved defenses against most of the well-known fingerprinting and mapping methods in order to prevent malicious users from determining virtual machine co-location on the same hardware. Our solution to co-locating virtual machines unhindered was to derive their clock skews, or the temporal deviation of the system clock over time. Capturing normal TCP traffic to analyze timestamps from a virtual machine in the cloud, our results were inconclusive in demonstrating that co-located virtual machines will have similar clock skews due to large, inconsistent packet delays. Our research demonstrates a potential vulnerability in cloud defenses so that cloud users and providers can take appropriate steps to prevent malicious co-location attacks.en_US
dc.description.urihttp://archive.org/details/cloudfingerprint1094550503
dc.publisherMonterey, California: Naval Postgraduate Schoolen_US
dc.rightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.en_US
dc.titleCloud fingerprinting: using clock skews to determine co-location of virtual machinesen_US
dc.typeThesisen_US
dc.contributor.departmentComputer Science
dc.subject.authorclouden_US
dc.subject.authorTCP timestampsen_US
dc.subject.authorclock skewsen_US
dc.subject.authorside-channel attacksen_US
dc.subject.authorvirtual machinesen_US
dc.subject.authorVM co-locationen_US
dc.subject.authorfinger-printingen_US
dc.description.recognitionOutstanding Thesis
dc.description.serviceLieutenant Commander, United States Navyen_US
etd.thesisdegree.nameMaster of Science in Computer Scienceen_US
etd.thesisdegree.levelMastersen_US
etd.thesisdegree.disciplineComputer Scienceen_US
etd.thesisdegree.grantorNaval Postgraduate Schoolen_US
dc.description.distributionstatementApproved for public release; distribution is unlimited.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record