通信学报 ›› 2018, Vol. 39 ›› Issue (11): 116-128.doi: 10.11959/j.issn.1000-436x.2018241

• 学术论文 • 上一篇    下一篇

面向云计算平台的虚拟机同驻方法

刘维杰1,2,王丽娜1,2(),王丹磊1,2,尹正光3,付楠1,2   

  1. 1 空天信息安全与可信计算教育部重点实验室,湖北 武汉 430079
    2 武汉大学国家网络安全学院,湖北 武汉 430079
    3 阿里云计算有限公司,浙江 杭州 311121
  • 修回日期:2018-06-29 出版日期:2018-11-01 发布日期:2018-12-10
  • 作者简介:刘维杰(1991–),男,湖北武汉人,武汉大学博士生,主要研究方向为虚拟化安全、图像处理等。|王丽娜(1964–),女,辽宁营口人,博士,武汉大学教授、博士生导师,主要研究方向为多媒体安全、云计算安全、可信计算等。|王丹磊(1992–),男,湖北武汉人,武汉大学硕士生,主要研究方向为机器学习、信息内容安全等。|尹正光(1989–),男,江西吉安人,硕士,阿里云计算有限公司高级开发工程师,主要研究方向为cloud native和IaaS架构等。|付楠(1993–),女,江西九江人,武汉大学硕士生,主要研究方向为网络安全、云计算安全等。
  • 基金资助:
    国家自然科学基金资助项目(U1536204);中央高校基本科研业务费专项基金资助项目(2042018kf1028)

Virtual machine co-residency method on cloud computing platform

Weijie LIU1,2,Li’na WANG1,2(),Danlei WANG1,2,Zhengguang YIN3,Nan FU1,2   

  1. 1 Key Laboratory of Aerospace Information Security and Trusted Computing,Ministry of Education,Wuhan 430079,China
    2 School of Cyber Science and Engineering,Wuhan University,Wuhan 430079,China
    3 Alibaba Cloud Computing Co.,Ltd.,Hangzhou 311121,China
  • Revised:2018-06-29 Online:2018-11-01 Published:2018-12-10
  • Supported by:
    The National Natural Science Foundation of China(U1536204);The Central University Basic Business Expenses Special Funding for Scientific Research Project(2042018kf1028)

摘要:

若攻击者想攻击云平台上某一目标虚拟机,则其必须与目标虚拟机同驻。基于此,提出一种虚拟机同驻方法,通过构建云环境中自适应的隐蔽信道,结合基于隐蔽信道的虚拟机同驻检测方法和自动化虚拟机洪泛策略,并在国内某知名商业云平台上进行同驻验证。实验表明,所构建的自适应隐蔽信道传输正确率可高达95%以上;所提出的同驻检测方法置信度高,误检率不超过5‰。同驻方法不会破坏云平台本身隔离性且具有一定的通用性,但潜在威胁极大,亟需重视与防范。

关键词: 云计算平台, 虚拟机同驻, 隐蔽信道, 虚拟机洪泛

Abstract:

If the attacker wants to compromise a target virtual machine on a cloud platform,the malicious virtual machine must be co-resident with the target.Based on this,a virtual machine co-residency method was proposed.The method combined a co-residency detection scheme based on covert channel construction and an automatic virtual machine flooding strategy,and was evaluated on a well-known domestic cloud platform.Experiment shows that the adaptive covert channel can achieve accuracies of 95%,the proposed detection scheme has strong robustness whose false positive rate is less than 5 ‰,the proposed method is versatile and keeps the virtualization isolation barrier intact,which has great potential threat and should be paid great attention and precaution.

Key words: cloud computing platform, virtual machine co-residency, covert channel,, virtual machine flooding

中图分类号: 

No Suggested Reading articles found!