Detection of Malware and Kernel-level Rootkits in Cloud Computing Environments

被引:8
|
作者
Win, Thu Yein [1 ]
Tianfield, Huaglory [1 ]
Mair, Quentin [1 ]
机构
[1] Glasgow Caledonian Univ, Sch Engn & Built Environm, Cloud & Data Lab, Glasgow G4 0BA, Lanark, Scotland
关键词
virtualization security; cloud security; malware detection; rootkit detection; support vector machine; virtual machine introspection;
D O I
10.1109/CSCloud.2015.54
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has become increasingly sophisticated. This paper presents a novel malware and rookit detection system which protects the guests against different attacks. It combines system call monitoring and system call hashing on the guest kernel together with Support Vector Machines (SVM)-based external monitoring on the host. We demonstrate the effectiveness of our solution by evaluating it against well-known user-level malware as well as kernel-level rootkit attacks.
引用
收藏
页码:295 / 300
页数:6
相关论文
共 50 条
  • [31] Kernel Rootkit Secret Detection in Cloud Computing
    Suresh Kumar, S.
    SudalaiMuthu, T.
    2022 1st International Conference on Computational Science and Technology, ICCST 2022 - Proceedings, 2022, : 276 - 280
  • [32] SNAPPY: Programmable Kernel-Level Policies for Containers
    Belair, Maxime
    Laniepce, Sylvie
    Menaud, Jean-Marc
    36TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, SAC 2021, 2021, : 1636 - 1645
  • [33] Design of Kernel-Level Asynchronous Collective Communication
    Nomura, Akihiro
    Ishikawa, Yutaka
    RECENT ADVANCES IN THE MESSAGE PASSING INTERFACE, 2010, 6305 : 92 - 101
  • [34] The checkpoint interval optimization of kernel-level rollback recovery based on the embedded mobile computing System
    Zhang Zhan
    Zuo De-cheng
    Ci Yi-wei
    Yang Xiao-zong
    8TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY WORKSHOPS: CIT WORKSHOPS 2008, PROCEEDINGS, 2008, : 521 - 526
  • [35] Redflag: A Framework for Analysis of Kernel-Level Concurrency
    Seyster, Justin
    Radhakrishnan, Prabakar
    Katoch, Samriti
    Duggal, Abhinav
    Stoller, Scott D.
    Zadok, Erez
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, PT I: ICA3PP 2011, 2011, 7916 : 66 - 79
  • [36] User-level protocol servers with kernel-level performance
    Brustoloni, JC
    Steenkiste, P
    IEEE INFOCOM '98 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS. 1-3: GATEWAY TO THE 21ST CENTURY, 1998, : 463 - 471
  • [37] Malware Detection in Cloud Computing using an Image Visualization Technique
    Abdullayeva, Fargana
    2019 IEEE 13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2019), 2019, : 201 - 205
  • [38] A New Malware Detection Method Based on VMCADR in Cloud Environments
    Zheng, Luxin
    Zhang, Jian
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [39] Malware Detection in Iaas Cloud Computing Using Time Based Detection Mechanisms
    Dhaya, C.
    Abirami, N.
    2017 INTERNATIONAL CONFERENCE ON TECHNICAL ADVANCEMENTS IN COMPUTERS AND COMMUNICATIONS (ICTACC), 2017, : 16 - 17
  • [40] Peeler: Profiling Kernel-Level Events to Detect Ransomware
    Ahmed, Muhammad Ejaz
    Kim, Hyoungshick
    Camtepe, Seyit
    Nepal, Surya
    COMPUTER SECURITY - ESORICS 2021, PT I, 2021, 12972 : 240 - 260