On the Use of Migration to Stop Illicit Channels

نویسنده

  • Kevin Falzon
چکیده

Side and covert channels (referred to collectively as illicit channels) are an insidious affliction of high security systems brought about by the unwanted and unregulated sharing of state amongst processes. Illicit channels can be effectively broken through isolation, which limits the degree by which processes can interact. The drawback of using isolation as a general mitigation against illicit channels is that it can be very wasteful when employed naïvely. In particular, permanently isolating every tenant of a public cloud service to its own separate machine would completely undermine the economics of cloud computing, as it would remove the advantages of consolidation. On closer inspection, it transpires that only a subset of a tenant’s activities are sufficiently security sensitive to merit strong isolation. Moreover, it is not generally necessary to maintain isolation indefinitely, nor is it given that isolation must always be procured at the machine level. This work builds on these observations by exploring a fine-grained and hierarchical model of isolation, where fractions of a machine can be isolated dynamically using migration. Using different units of isolation allows a system to isolate processes from each other with a minimum of over-allocated resources, and having a dynamic and reconfigurable model enables isolation to be procured on-demand. The model is then realised as an implemented framework that allows the fine-grained provisioning of units of computation, managing migrations at the core, virtual CPU, process group, process/container and virtual machine level. Use of this framework is demonstrated in detecting and mitigating a machine-wide covert channel, and in implementing a multi-level moving target defence. Finally, this work describes the extension of post-copy live migration mechanisms to allow temporary virtual machine migration. This adds the ability to isolate a virtual machine on a short term basis, which subsequently allows migrations to happen at a higher frequency and with fewer redundant memory transfers, and also creates the opportunity of time-sharing a particular physical machine’s features amongst a set of tenants’ virtual machines.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The Impact of Multimodal Channels on Teaching Idiomatic Expressions to Intermediate EFL Learners with Regard to Their Attitudes

This study was to explore facilitative function of using multimodal channels over single channel presentation and comprehension of idiomatic expressions to Iranian EFL intermediate proficiency learners. Out of a pool of 90, sixty intermediate participants were homogenized by a QPT test, using a quasi-experimental design. They were randomly assigned to three equal groups: WhatsApp-, SMS- and Cla...

متن کامل

Illicit Drug Use and its Correlations Among Hookah Users in Khalil Abad, Northeast of Iran

Background and aims: One of the most important problems of public health is illicit drug use. The aim of this study was to assess the status of illicit drug use and associated factors among hookah smokers in Khalil Abad city in 2015. Methods: The cross-sectional study was conducted in Khalil Abad city (northeast of Iran) in 2015. A sample of 161 hookah users was selected using 2-stage sampling....

متن کامل

Prevalence of Illicit Drug Use and Related Factors in Adults: Results of First Phase of Shahedieh Cohort Study 2015-2016

Background and Objectives: Drug use not only affects a person's physical and mental health, but also affects the health of others in the community. Various variables, including demographic and social factors, affect drug use. The present study was conducted to investigate the prevalence of drug use and related factors in the participants of Shahedieh Cohort Study. Methods: A descriptive stud...

متن کامل

Effectiveness of Resilience Training on Ego-control and Hardiness of Illicit Drug Users

Background: The aim of this research was to determine the effectiveness of resilience training upon ego-control and hardiness of the addicted persons.Methods: This was a semi-experimental study with pretest and posttest control groups which was conducted in Sari, Iran, during 2014-2015. Thirty persons were selected among 240 illicit drug users who underwent screening. Resilience training was pe...

متن کامل

Prevalence of Cigarette Smoking, Alcohol Drinking and Illegal Drugs Use among Iranian Adolescents

Background & Aims: Substance abuse by adolescents is one of the most important health challenges throughout the world. This study was performed to estimate the prevalence of cigarette smoking, alcohol drinking and illegal drugs use among Iranian adolescents. Method: A total of 2538 secondary and high school students were selected through cluster sampling from 10 provinces in Iran and were surve...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017