Malware Analysis in Cloud Computing: Network and System Characteristics

被引:0
|
作者
Marnerides, Angelos K. [1 ]
Watson, Michael R. [1 ]
Shirazi, Noorulhassan [1 ]
Mauthe, Andreas [1 ]
Hutchison, David [1 ]
机构
[1] Univ Lancaster, Sch Comp & Commun, InfoLab21, Lancaster LA1 4YW, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.
引用
收藏
页码:482 / 487
页数:6
相关论文
共 50 条
  • [41] Network virtualization for cloud computing
    Fabio Baroncelli
    Barbara Martini
    Piero Castoldi
    annals of telecommunications - annales des télécommunications, 2010, 65 : 713 - 721
  • [42] Technology–function matrix based network analysis of cloud computing
    Jia-Yen Huang
    Hung-Tu Hsu
    Scientometrics, 2017, 113 : 17 - 44
  • [43] Patented Network Analysis on Cloud Computing Technology in Internet of Things
    Yuan, Yu
    Ma, Li
    Zhang, Junsheng
    2014 International Conference on Identification, Information and Knowledge in the Internet of Things (IIKI 2014), 2014, : 248 - 251
  • [44] Design of cloud computing architecture for power system analysis
    Xu, Chen
    Zhao, Feng
    Wang, Zhicheng
    Lin, Xiangning
    He, Shan
    Shao, Chong
    2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
  • [45] Global collaboration requirement analysis system in cloud computing
    Prakasa, Ivan
    Shigo, Osamu
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON SOFT COMPUTING AND SOFTWARE ENGINEERING (SCSE'15), 2015, 62 : 332 - 334
  • [46] Noninterference Analysis of Trust of Behavior in Cloud Computing System
    Zhang F.
    Zhang C.
    Chen W.
    Hu F.-N.
    Xu M.-D.
    Jisuanji Xuebao/Chinese Journal of Computers, 2019, 42 (04): : 736 - 755
  • [47] Analysis on the Impact of Cloud Computing for Management Information System
    Wang, Xiaojing
    Ran, Conglin
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 300 - 305
  • [48] Analysis of the Health Information and Communication System and Cloud Computing
    Varga, Matija
    TEM JOURNAL-TECHNOLOGY EDUCATION MANAGEMENT INFORMATICS, 2015, 4 (02): : 149 - 155
  • [49] Detection of Malware and Kernel-level Rootkits in Cloud Computing Environments
    Win, Thu Yein
    Tianfield, Huaglory
    Mair, Quentin
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 295 - 300
  • [50] War against Mobile Malware with Cloud Computing and Machine Learning forces
    Idrees, Fauzia
    Muttukrishnan, Rajarajan
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 278 - 280