Malware Analysis in Cloud Computing: Network and System Characteristics

被引:0
|
作者
Marnerides, Angelos K. [1 ]
Watson, Michael R. [1 ]
Shirazi, Noorulhassan [1 ]
Mauthe, Andreas [1 ]
Hutchison, David [1 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, InfoLab21, Lancaster LA1 4YW, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.
引用
收藏
页码:482 / 487
页数:6
相关论文
共 50 条
  • [21] DESIGN OF NETWORK EXPECTED PSYCHOLOGICAL CHARACTERISTICS AND BEHAVIOR PREDICTION SYSTEM BASED ON CLOUD COMPUTING TECHNOLOGY
    Xu, Jianhui
    Mustafa, Man
    Ahmad, Sabri Ily Amalina
    Li, Xiangmei
    PSYCHIATRIA DANUBINA, 2022, 34 : S272 - S272
  • [22] Cloud Computing System Based on Wireless Sensor Network
    Chung, Wen-Yaw
    Yu, Pei-Shan
    Huang, Chao-Jen
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 877 - 880
  • [23] Cloud computing for network security intrusion detection system
    Yang, J. (jinnyang@163.com), 1600, Academy Publisher (08):
  • [24] Proxy Network Intrusion Detection System for Cloud Computing
    Oktay, Ueman
    Sahingoz, Ozgur Koray
    2013 INTERNATIONAL CONFERENCE ON TECHNOLOGICAL ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (TAEECE), 2013, : 98 - 104
  • [25] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Zhen Chen
    Fuye Han
    Junwei Cao
    Xin Jiang
    Shuo Chen
    TsinghuaScienceandTechnology, 2013, 18 (01) : 40 - 50
  • [26] Cloud Computing-Based Forensic Analysis for Collaborative Network Security Management System
    Chen, Zhen
    Han, Fuye
    Cao, Junwei
    Jiang, Xin
    Chen, Shuo
    TSINGHUA SCIENCE AND TECHNOLOGY, 2013, 18 (01) : 40 - 50
  • [27] MOBDroid: An Intelligent Malware Detection System for Improved Data Security in Mobile Cloud Computing Environments
    Ogwara, Noah Oghenefego
    Petrova, Krassie
    Yang, Mee Loong Bobby
    2020 30TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2020, : 121 - 126
  • [28] Analysis of Network Management and Monitoring Using Cloud Computing
    Suciu, George
    Suciu, Victor
    Gheorghe, Razvan
    Dobre, Ciprian
    Pop, Florin
    Castiglione, Aniello
    COMPUTATIONAL INTELLIGENCE AND INTELLIGENT SYSTEMS, (ISICA 2015), 2016, 575 : 343 - 352
  • [29] Cloud computing in agriculture: a bibliometric and network visualization analysis
    Punjani K.K.
    Mahadevan K.
    Gunasekaran A.
    Kumar V.V.R.
    Joshi S.
    Quality & Quantity, 2023, 57 (4) : 3849 - 3883
  • [30] Analysis and Research of Cloud Computing System Instance
    Zhang, Shufen
    Zhang, Shuai
    Chen, Xuebin
    Wu, Shangzhuo
    SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 88 - 92