期刊名称:International Journal of Engineering and Computer Science
印刷版ISSN:2319-7242
出版年度:2014
卷号:3
期号:5
页码:5848-5865
出版社:IJECS
摘要:This work focused on how a malignant user could attack customers which share physical resources andoperate coresidence profiling and public-to-private IP mapping to target. Malicious user’s attack: resourceplacement (VM) on the target’s physical machine and extraction from the target’s physical machine. Theproposed work depends on user account and workload clustering to reduce co residence profiling by musselself-organization. Similar user behavior and workload types are belonged to same cluster. In order to unclearthe public-to-private IP map, each cluster is supervised and used by an account proxy. In this work, each proxyuses one public IP address, which is used by all clustered users when accessing their instances, and maintainsthe mapping to private IP addresses. This work explained set of abilities and attack paths in which an attackerneeds to launch attack for targeted co residence. It shows how our approach disturbs the critical steps in theattack path for most cases and then performs a riskassessment to determine the probability an individual user will be victimized, given that a successful nondirected exploit has occurred