A Stealth Migration Approach to Moving Target Defense in Cloud Computing
A stealth migration protocol is proposed in this paper that obfuscates the virtual machine (VM) migration from intruders and enhances the security of the MTD process. Starting by encrypting the VM data and generating a secret key that is split along with the encrypted data into small chunks. Then the fragments are transmitted through intermediate VMs on the way to the destination VM. As a result, the chances of an intruder detecting the VM migration is reduced. The migration traffic is maintained close to normal traffic by adjusting the chunk size, thereby avoiding the attention of the intruder. Finally, the normal and migration traffic patterns are analyzed with the proposed protocol.
Advances in Intelligent Systems and Computing
Das, S., Mahfouz, A., & Shiva, S. (2020). A Stealth Migration Approach to Moving Target Defense in Cloud Computing. Advances in Intelligent Systems and Computing, 1069, 394-410. https://doi.org/10.1007/978-3-030-32520-6_31