Proceedings 2017 Network and Distributed System Security Symposium 2017
DOI: 10.14722/ndss.2017.23365
|View full text |Cite
|
Sign up to set email alerts
|

TenantGuard: Scalable Runtime Verification of Cloud-Wide VM-Level Network Isolation

Abstract: Multi-tenancy in the cloud usually leads to security concerns over network isolation around each cloud tenant's virtual resources. However, verifying network isolation in cloud virtual networks poses several unique challenges. The sheer size of virtual networks implies a prohibitive complexity, whereas the constant changes in virtual resources demand a short response time. To make things worse, such networks typically allow fine-grained (e.g., VM-level) and distributed (e.g., security groups) network access co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…The regression test suit avoids enforcing policies that may introduce security vulnerabilities or availability issues in the network. Other works [85], [71], [89], [90] concentrate on monitoring the network configuration changes to detect change events that introduce security failures.…”
Section: Traffic Filtering Enforcement Verificationmentioning
confidence: 99%
“…The regression test suit avoids enforcing policies that may introduce security vulnerabilities or availability issues in the network. Other works [85], [71], [89], [90] concentrate on monitoring the network configuration changes to detect change events that introduce security failures.…”
Section: Traffic Filtering Enforcement Verificationmentioning
confidence: 99%
“…Cloud providers are responsible for manually writing available and secure network policies that are thus error-prone. Existing works such as NoD [3], Plotkin et al [4], Cloud Radar [5], Probst et al, [6] and Tenant-Guard [7] proposed several methods for verifying policies formatted routing rules.…”
Section: Introductionmentioning
confidence: 99%