Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Multi-covert channel attack in the cloud
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
Universita di Roma Sapienza, Rome, Italy.
Universita di Roma Sapienza, Rome, Italy.
2019 (English)In: 2019 6th International Conference on Software Defined Systems, SDS 2019, Institute of Electrical and Electronics Engineers Inc. , 2019, p. 160-165Conference paper, Published paper (Refereed)
Abstract [en]

Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the message. However, encryption only restricts unapproved individuals from decoding the message. Whereas in many circumstances, the mere presence of communication or variations in communication patterns, such as an increase in message rate, is sufficient to raise doubt and initiate alerts. One of the best ways to bypass that is by using covert channels. In this paper, we create innovative protocols that use multiple covert channels working in parallel to exfiltrate data from a remote-controlled machine to our server. The provided protocols guarantee the completeness and unforgeability of the exfiltrated data. We analyze the difference in performance between the created protocols and provide mathematical equations to evaluate them.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc. , 2019. p. 160-165
Keywords [en]
Cloud security, Covert channels, Data exfiltration, Network Security, Software Defined Systems, Remote control, Cloud securities, Communication pattern, Mathematical equations, Mere presences, Cryptography
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kau:diva-75740DOI: 10.1109/SDS.2019.8768563ISI: 000492873000022Scopus ID: 2-s2.0-85073893934ISBN: 9781728107226 (print)OAI: oai:DiVA.org:kau-75740DiVA, id: diva2:1369702
Conference
6th International Conference on Software Defined Systems, SDS 2019, 10 June 2019 through 13 June 2019
Available from: 2019-11-12 Created: 2019-11-12 Last updated: 2019-12-12Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records BETA

Akil, Mahdi

Search in DiVA

By author/editor
Akil, Mahdi
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 5 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf