Malware Containment in Cloud

被引:2
|
作者
Malvankar, Abhishek [1 ]
Payne, Joshua [2 ]
Budhraja, Karan K. [3 ]
Kundu, Ashish [1 ]
Chari, Suresh [1 ]
Mohania, Mukesh [4 ]
机构
[1] IBM Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[4] IIIT Delhi, Delhi, India
来源
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019) | 2019年
关键词
Malware; Containment; Cloud Computing; Blockchain; Dominance Frontier; Smart Contracts; Hyperledger; Graph Neural Networks; PROPAGATION; MODEL;
D O I
10.1109/TPS-ISA48467.2019.00036
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is pervasive and poses serious threats to normal operation of business processes in cloud. Cloud computing environments typically have hundreds of hosts that are connected to each other, often with high risk trust assumptions and/or protection mechanisms that are not difficult to break. Malware often exploits such weaknesses, as its immediate goal is often to spread itself to as many hosts as possible. Detecting this propagation is often difficult to address because the malware may reside in multiple components across the software or hardware stack. In this scenario, it is usually best to contain the malware to the smallest possible number of hosts, and it's also critical for system administration to resolve the issue in a timely manner. Furthermore, resolution often requires that several participants across different organizational teams scramble together to address the intrusion. In this vision paper, we define this problem in detail. We then present our vision of decentralized malware containment and the challenges and issues associated with this vision. The approach of containment involves detection and response using graph analytics coupled with a blockchain framework. We propose the use of a dominance frontier for profile nodes which must be involved in the containment process. Smart contracts are used to obtain consensus amongst the involved parties. The paper presents a basic implementation of this proposal. We have further discussed some open problems related to our vision.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 50 条
  • [21] Recurrent Neural Networks Based Online Behavioural Malware Detection Techniques for Cloud Infrastructure
    Kimmel, Jeffrey C.
    Mcdole, Andrew D.
    Abdelsalam, Mahmoud
    Gupta, Maanak
    Sandhu, Ravi
    IEEE ACCESS, 2021, 9 : 68066 - 68080
  • [22] Malware Analysis on the Cloud: Increased Performance, Reliability, and Flexibilty
    Schweiger, Michael
    Chung, Sam
    Endicott-Popovsky, Barbara
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 127 - 135
  • [23] Multistage Signaling Game-Based Optimal Detection Strategies for Suppressing Malware Diffusion in Fog-Cloud-Based IoT Networks
    Shen, Shigen
    Huang, Longjun
    Zhou, Haiping
    Yu, Shui
    Fan, En
    Cao, Qiying
    IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (02): : 1043 - 1054
  • [24] Mobile Malware Security Challeges and Cloud-Based Detection
    Penning, Nicholas
    Hoffman, Michael
    Nikolai, Jason
    Wang, Yong
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON COLLABORATION TECHNOLOGIES AND SYSTEMS (CTS), 2014, : 181 - 188
  • [25] CloudTaint: an elastic taint tracking framework for malware detection in the cloud
    Yuan, Jinfeng
    Qiang, Weizhong
    Jin, Hai
    Zou, Deqing
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (03) : 1433 - 1450
  • [26] Malware Detection in the Cloud under Ensemble Empirical Mode Decomposition
    Marnerides, Angelos K.
    Spachos, Petros
    Chatzimisios, Periklis
    Mauthe, Andreas U.
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2015, : 82 - 88
  • [27] CloudTaint: an elastic taint tracking framework for malware detection in the cloud
    Jinfeng Yuan
    Weizhong Qiang
    Hai Jin
    Deqing Zou
    The Journal of Supercomputing, 2014, 70 : 1433 - 1450
  • [28] A Scalable and Efficient Multi-Agent Architecture for Malware Protection in Data Sharing Over Mobile Cloud
    Qaisar, Zahid Hussain
    Almotiri, Sultan H.
    Al Ghamdi, Mohammed A.
    Nagra, Arfan Ali
    Ali, Ghulam
    IEEE ACCESS, 2021, 9 : 76248 - 76259
  • [29] Research on Cloud-Based on Web Application Malware Detection Methods
    Kim, Ki-Hwan
    Lee, Dong-Il
    Shin, Yong-Tae
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 817 - 822
  • [30] A Malware Family Classification Method Based on the Point Cloud Model DGCNN
    Ding, Yuxin
    Zhou, Zihan
    Qian, Wen
    NETWORK AND SYSTEM SECURITY, NSS 2021, 2021, 13041 : 210 - 221