Multi-covert channel attack in the cloud
2019 (English)In: 2019 6th International Conference on Software Defined Systems, SDS 2019, IEEE, 2019, p. 160-165Conference paper, Published paper (Refereed)
Abstract [en]
Frequently, it is believed that the adoption of encryption is adequate to ensure the safety of the message. However, encryption only restricts unapproved individuals from decoding the message. Whereas in many circumstances, the mere presence of communication or variations in communication patterns, such as an increase in message rate, is sufficient to raise doubt and initiate alerts. One of the best ways to bypass that is by using covert channels. In this paper, we create innovative protocols that use multiple covert channels working in parallel to exfiltrate data from a remote-controlled machine to our server. The provided protocols guarantee the completeness and unforgeability of the exfiltrated data. We analyze the difference in performance between the created protocols and provide mathematical equations to evaluate them.
Place, publisher, year, edition, pages
IEEE, 2019. p. 160-165
Keywords [en]
Cloud security, Covert channels, Data exfiltration, Network Security, Software Defined Systems, Remote control, Cloud securities, Communication pattern, Mathematical equations, Mere presences, Cryptography
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:kau:diva-75740DOI: 10.1109/SDS.2019.8768563ISI: 000492873000022Scopus ID: 2-s2.0-85073893934ISBN: 9781728107226 (print)OAI: oai:DiVA.org:kau-75740DiVA, id: diva2:1369702
Conference
6th International Conference on Software Defined Systems, SDS 2019, 10 June 2019 through 13 June 2019
2019-11-122019-11-122020-12-22Bibliographically approved