Paper
28 May 2013 On localization attacks against cloud infrastructure
Linqiang Ge, Wei Yu, Mohammad Ali Sistani
Author Affiliations +
Abstract
One of the key characteristics of cloud computing is the device and location independence that enables the user to access systems regardless of their location. Because cloud computing is heavily based on sharing resource, it is vulnerable to cyber attacks. In this paper, we investigate a localization attack that enables the adversary to leverage central processing unit (CPU) resources to localize the physical location of server used by victims. By increasing and reducing CPU usage through the malicious virtual machine (VM), the response time from the victim VM will increase and decrease correspondingly. In this way, by embedding the probing signal into the CPU usage and correlating the same pattern in the response time from the victim VM, the adversary can find the location of victim VM. To determine attack accuracy, we investigate features in both the time and frequency domains. We conduct both theoretical and experimental study to demonstrate the effectiveness of such an attack.
© (2013) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Linqiang Ge, Wei Yu, and Mohammad Ali Sistani "On localization attacks against cloud infrastructure", Proc. SPIE 8757, Cyber Sensing 2013, 875703 (28 May 2013); https://doi.org/10.1117/12.2015626
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Clouds

Computer security

Operating systems

Signal detection

Signal generators

Data centers

Data storage

Back to Top