2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications 2013
DOI: 10.1109/trustcom.2013.62
|View full text |Cite
|
Sign up to set email alerts
|

Cloud Computing: Insider Attacks on Virtual Machines during Migration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(11 citation statements)
references
References 5 publications
0
11
0
Order By: Relevance
“…However, if an attacker knows precisely what he/she is looking for, disinformation might not hinder theft of information. On the other hand, sample data sniffers have a great potential in mitigating attacks during virtual machines (VM) migrations [14] since once a VM is reallocated to different hypervisor, a malicious attacker could exploit the vulnerabilities and obtain a large amount of data. From the above, and to the best of our knowledge, it is clear that no similar attempts have been made in using self-adaptation techniques in order to deal with uncertainties related to insider threats in cloud computing.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…However, if an attacker knows precisely what he/she is looking for, disinformation might not hinder theft of information. On the other hand, sample data sniffers have a great potential in mitigating attacks during virtual machines (VM) migrations [14] since once a VM is reallocated to different hypervisor, a malicious attacker could exploit the vulnerabilities and obtain a large amount of data. From the above, and to the best of our knowledge, it is clear that no similar attempts have been made in using self-adaptation techniques in order to deal with uncertainties related to insider threats in cloud computing.…”
Section: Related Workmentioning
confidence: 99%
“…Senador Salgado Filho, S/N -59.098-970 Natal, RN, Brazil Full list of author information is available at the end of the article Although there has been an increasing adoption of cloud computing systems, some aspects related to security and privacy are still in its infancy, such as, the handling of insider threats. Some efforts have been made for dealing with malicious attacks in cloud [14,16,30], but these have not considered insider threats. An insider threat can be understood as a user who has or had authorised access to an organisation's network, system, or data, and exceed or misuse that access in a manner that can negatively affect the confidentiality, integrity, or availability of the organisation's information or information systems [5].…”
Section: Introductionmentioning
confidence: 99%
“…The latter requires a change of IP address and introduces another challenge that limits migration in cloud computing [25]. LVMM has been penetrated via man-in-the-middle attacks, as well as successfully attacked by through flag migration [16,26,27]. LVMM introduces important security issues because it includes VM state transfer through communication links, which can be attacked by ARP spoofing, DNS spoofing and route Hijacking [28].…”
Section: Fig 2: Lvmm Process Steps [24]mentioning
confidence: 99%
“…Especially the System administrator, who is an insider, can only be suspected for this type of crime. In their second work [3], they created a set-up like real cloud system used in the IaaS (Infrastructure as a Service) and identify the attack vectors based on their observations which they have found as relevant security problems in the migration of the virtual machines. The virtual machine migration can only be possible by the highly privileged person i.e.…”
Section: Related Work In Cloud Insider Threatsmentioning
confidence: 99%