Malware Containment in Cloud

被引:2
|
作者
Malvankar, Abhishek [1 ]
Payne, Joshua [2 ]
Budhraja, Karan K. [3 ]
Kundu, Ashish [1 ]
Chari, Suresh [1 ]
Mohania, Mukesh [4 ]
机构
[1] IBM Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[4] IIIT Delhi, Delhi, India
来源
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019) | 2019年
关键词
Malware; Containment; Cloud Computing; Blockchain; Dominance Frontier; Smart Contracts; Hyperledger; Graph Neural Networks; PROPAGATION; MODEL;
D O I
10.1109/TPS-ISA48467.2019.00036
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is pervasive and poses serious threats to normal operation of business processes in cloud. Cloud computing environments typically have hundreds of hosts that are connected to each other, often with high risk trust assumptions and/or protection mechanisms that are not difficult to break. Malware often exploits such weaknesses, as its immediate goal is often to spread itself to as many hosts as possible. Detecting this propagation is often difficult to address because the malware may reside in multiple components across the software or hardware stack. In this scenario, it is usually best to contain the malware to the smallest possible number of hosts, and it's also critical for system administration to resolve the issue in a timely manner. Furthermore, resolution often requires that several participants across different organizational teams scramble together to address the intrusion. In this vision paper, we define this problem in detail. We then present our vision of decentralized malware containment and the challenges and issues associated with this vision. The approach of containment involves detection and response using graph analytics coupled with a blockchain framework. We propose the use of a dominance frontier for profile nodes which must be involved in the containment process. Smart contracts are used to obtain consensus amongst the involved parties. The paper presents a basic implementation of this proposal. We have further discussed some open problems related to our vision.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 50 条
  • [1] Towards Deep Federated Defenses Against Malware in Cloud Ecosystems
    Payne, Joshua
    Kundu, Ashish
    2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 92 - 100
  • [2] Early Containment of Fast Network Worm Malware
    Ahmad, Muhammad Aminu
    Woodhead, Steve
    Gan, Diane
    2016 3RD NATIONAL FOUNDATION FOR SCIENCE AND TECHNOLOGY DEVELOPMENT CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2016, : 195 - 201
  • [3] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [4] Cloud Based Malware Detection Technique
    Shaw, Sagar
    Gupta, Manish Kumar
    Chakraborty, Sanjay
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 485 - 495
  • [5] Spatio-temporal malware containment model with alert
    Godoi, Antonio Carlos B.
    Piqueira, Jose Roberto C.
    CHAOS SOLITONS & FRACTALS, 2023, 173
  • [6] Dynamic malware containment under an epidemic model with alert
    Zhang, Tianrui
    Yang, Lu-Xing
    Yang, Xiaofan
    Wu, Yingbo
    Tang, Yuan Yan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2017, 470 : 249 - 260
  • [7] Enhanced Malware Prediction and Containment Using Bayesian Neural Networks
    Jamadi, Zahra
    Aghdam, Amir G.
    IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2024, 8 : 592 - 600
  • [8] MalPro: A Learning-based Malware Propagation and Containment Modeling
    Valizadeh, Saeed
    van Dijk, Marten
    CCSW'19: PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON CLOUD COMPUTING SECURITY WORKSHOP, 2019, : 45 - 56
  • [9] Automatic Discovery of Malware Signature for Anti-virus Cloud Computing
    Xu, Dawei
    Yu, Cunjiang
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1640 - 1643
  • [10] Classifying malware attacks in IaaS cloud environments
    Noëlle Rakotondravony
    Benjamin Taubmann
    Waseem Mandarawi
    Eva Weishäupl
    Peng Xu
    Bojan Kolosnjaji
    Mykolai Protsenko
    Hermann de Meer
    Hans P. Reiser
    Journal of Cloud Computing, 6