Cloud Computing: Insider Attacks on Virtual Machines During Migration

Adrian Duncan, Sadie Creese, Michael Goldsmith, Jamie Quinton

    Research output: Contribution to conferencePaper

    18 Citations (Scopus)

    Abstract

    The use of Virtual Machines (VMs) and Infrastructure-as-a-Service (IaaS) has risen dramatically and, according to Gartner, is set to continue rising with a compound annual growth rate predicted to be 41.7% over the four years to 2016. By using Cloud providers, organisations are reducing their capital expenditure on hardware, software and support, however, these same organisations are putting a great deal of trust in the provider offering a safe and secure platform for their data and resources. One of the biggest benefits of IaaS to the customer is the rapid elasticity of their provision. This elasticity can require relocation of a VM from one physical machine and / or one hypervisor to another. Whilst such migration is transparent and potentially seamless, it may also introduce vulnerability. We explore here the potential for a malicious insider to exploit vulnerabilities associated with mobile VMs to obtain large volumes of cloud-user data, and consider the possibility of detecting such attacks using current digital forensics and systems administration techniques.

    Original languageEnglish
    Pages493-500
    Number of pages8
    DOIs
    Publication statusPublished - 1 Dec 2013
    Event12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications -
    Duration: 16 Jul 2013 → …

    Conference

    Conference12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
    Period16/07/13 → …

    Keywords

    • Hostile VM Capture
    • Insider Attack
    • Malicious Insider
    • Packet Sniffing
    • Unauthorised Cloning
    • VMotion
    • VMWare

    Fingerprint Dive into the research topics of 'Cloud Computing: Insider Attacks on Virtual Machines During Migration'. Together they form a unique fingerprint.

  • Cite this

    Duncan, A., Creese, S., Goldsmith, M., & Quinton, J. (2013). Cloud Computing: Insider Attacks on Virtual Machines During Migration. 493-500. Paper presented at 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, . https://doi.org/10.1109/TrustCom.2013.62