Malware Analysis in Cloud Computing: Network and System Characteristics

被引:0
|
作者
Marnerides, Angelos K. [1 ]
Watson, Michael R. [1 ]
Shirazi, Noorulhassan [1 ]
Mauthe, Andreas [1 ]
Hutchison, David [1 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, InfoLab21, Lancaster LA1 4YW, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.
引用
收藏
页码:482 / 487
页数:6
相关论文
共 50 条
  • [1] Effective analysis of malware detection in cloud computing
    Yadav, Ram Mahesh
    COMPUTERS & SECURITY, 2019, 83 : 14 - 21
  • [2] An Android Malware Detection System Based on Cloud Computing
    Cui, Shujuan
    Sun, Gengxin
    Bin, Sheng
    Zhou, Xicheng
    3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 691 - 696
  • [3] Malware analysis performance enhancement using cloud computing
    Barakat, Osamah L.
    Hashim, Shaiful J.
    Abdullah, Raja Syamsul Azmir B. Raja
    Ramli, Abdul Rahman
    Hashim, Fazirulhisyam
    Samsudin, Khairulmizam
    Ab Rahman, Mahmud
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2014, 10 (01): : 1 - 10
  • [4] Analysis of Detection and Prevention of Malware in Cloud Computing Environment
    Bedi, Anav
    Pandey, Nitin
    Khatri, Sunil Kumar
    PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 918 - 921
  • [5] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [6] A Network Behavior Analysis System for Cloud Computing Service
    Lin, Bon-Yeh
    Chen, Chi-Hua
    Chang, Hsu-Chia
    Lo, Chi-Chun
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (03): : 931 - 937
  • [7] Cloud Computing and Network Analysis
    de la Torre, Cesar
    Carlos Polo, Juan
    INFORMATION SYSTEMS ARCHITECTURE AND TECHNOLOGY, ISAT 2018, PT I, 2019, 852 : 190 - 198
  • [8] Malware Detection in Cloud Computing Infrastructures
    Watson, Michael R.
    Shirazi, Noor-ul-Hassan
    Marnerides, Angelos K.
    Mauthe, Andreas
    Hutchison, David
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 192 - 205
  • [9] Smartphone malware detection model based on artificial immune system in cloud computing
    Wu, Bin
    Lin, Xing
    Li, Wei-Dong
    Lu, Tian-Liang
    Zhang, Dong-Mei
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (04): : 33 - 37
  • [10] Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment
    Aslan, Omer
    Ozkan-Okay, Merve
    Gupta, Deepti
    IEEE Access, 2021, 9 : 83252 - 83271