A Stealth Migration Approach to Moving Target Defense in Cloud Computing

A stealth migration protocol is proposed in this paper that obfuscates the virtual machine (VM) migration from intruders and enhances the security of the MTD process. Starting by encrypting the VM data and generating a secret key that is split along with the encrypted data into small chunks. Then the fragments are transmitted through intermediate VMs on the way to the destination VM. As a result, the chances of an intruder detecting the VM migration is reduced. The migration traffic is maintained close to normal traffic by adjusting the chunk size, thereby avoiding the attention of the intruder. Finally, the normal and migration traffic patterns are analyzed with the proposed protocol.

[1]  Sajjan G. Shiva,et al.  Automated Live Migration in OpenStack:A Moving Target Defense Solution , 2017 .

[2]  Scott A. DeLoach,et al.  Mission-oriented moving target defense based on cryptographically strong network dynamics , 2013, CSIIRW '13.

[3]  Saikat Das,et al.  CoRuM: Collaborative Runtime Monitor Framework for Application Security , 2018, 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion).

[4]  Mahadev Satyanarayanan,et al.  Internet suspend/resume , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.

[5]  Sajjan G. Shiva,et al.  RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS , 2012 .

[6]  Feng Xia,et al.  Virtual machine migration in cloud data centers: a review, taxonomy, and open research issues , 2015, The Journal of Supercomputing.

[7]  Sadie Creese,et al.  Cloud Computing: Insider Attacks on Virtual Machines during Migration , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[8]  Srikanth V. Krishnamurthy,et al.  Stealth migration: Hiding virtual machines on the network , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[9]  Vitaly Shmatikov,et al.  The Parrot Is Dead: Observing Unobservable Network Communications , 2013, 2013 IEEE Symposium on Security and Privacy.

[10]  Umesh Deshpande,et al.  Fast Server Deprovisioning through Scatter-Gather Live Migration of Virtual Machines , 2014, 2014 IEEE 7th International Conference on Cloud Computing.

[11]  Anupam Tamrakar Security in Live Migration of Virtual Machine with Automated Load Balancing , 2014 .

[12]  Riccardo Bettati,et al.  On effectiveness of link padding for statistical traffic analysis attacks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..

[13]  Kenichi Kourai,et al.  Split Migration of Large Memory Virtual Machines , 2016, APSys.

[14]  Sajjan G. Shiva,et al.  Runtime monitors for tautology based SQL injection attacks , 2012, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec).