Malware Containment in Cloud

被引:2
|
作者
Malvankar, Abhishek [1 ]
Payne, Joshua [2 ]
Budhraja, Karan K. [3 ]
Kundu, Ashish [1 ]
Chari, Suresh [1 ]
Mohania, Mukesh [4 ]
机构
[1] IBM Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[4] IIIT Delhi, Delhi, India
来源
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019) | 2019年
关键词
Malware; Containment; Cloud Computing; Blockchain; Dominance Frontier; Smart Contracts; Hyperledger; Graph Neural Networks; PROPAGATION; MODEL;
D O I
10.1109/TPS-ISA48467.2019.00036
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is pervasive and poses serious threats to normal operation of business processes in cloud. Cloud computing environments typically have hundreds of hosts that are connected to each other, often with high risk trust assumptions and/or protection mechanisms that are not difficult to break. Malware often exploits such weaknesses, as its immediate goal is often to spread itself to as many hosts as possible. Detecting this propagation is often difficult to address because the malware may reside in multiple components across the software or hardware stack. In this scenario, it is usually best to contain the malware to the smallest possible number of hosts, and it's also critical for system administration to resolve the issue in a timely manner. Furthermore, resolution often requires that several participants across different organizational teams scramble together to address the intrusion. In this vision paper, we define this problem in detail. We then present our vision of decentralized malware containment and the challenges and issues associated with this vision. The approach of containment involves detection and response using graph analytics coupled with a blockchain framework. We propose the use of a dominance frontier for profile nodes which must be involved in the containment process. Smart contracts are used to obtain consensus amongst the involved parties. The paper presents a basic implementation of this proposal. We have further discussed some open problems related to our vision.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 50 条
  • [31] Prevention of Runtime Malware Injection Attack in Cloud Using Unsupervised Learning
    Prabhavathy, M.
    UmaMaheswari, S.
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (01) : 101 - 114
  • [32] War against Mobile Malware with Cloud Computing and Machine Learning forces
    Idrees, Fauzia
    Muttukrishnan, Rajarajan
    2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD NETWORKING (CLOUDNET), 2014, : 278 - 280
  • [33] Implementing Anti-Malware as Security-as-a-Service from Cloud
    Sharma, Deepak H.
    Dhote, C. A.
    Potey, Manish M.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 533 - 539
  • [34] Malware Propagation in Large-Scale Networks
    Yu, Shui
    Gu, Guofei
    Barnawi, Ahmed
    Guo, Song
    Stojmenovic, Ivan
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2015, 27 (01) : 170 - 179
  • [35] A Cloud-Assisted Malware Detection and Suppression Framework for Wireless Multimedia System in IoT Based on Dynamic Differential Game
    Zhou, Weiwei
    Yu, Bin
    CHINA COMMUNICATIONS, 2018, 15 (02) : 209 - 223
  • [36] VMShield: Memory Introspection-Based Malware Detection to Secure Cloud-Based Services Against Stealthy Attacks
    Mishra, Preeti
    Aggarwal, Palak
    Vidyarthi, Ankit
    Singh, Pawan
    Khan, Baseem
    Alhelou, Hassan Haes
    Siano, Pierluigi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2021, 17 (10) : 6754 - 6764
  • [37] Securing Linux Cloud Environments: Privacy-Aware Federated Learning Framework for Advanced Malware Detection in Linux Clouds
    Landman, Tom
    Nissim, Nir
    IEEE ACCESS, 2025, 13 : 30377 - 30394
  • [38] Efficient malware detection based on machine learning for enhanced cloud privacy protection
    Baawi, Salwa Shakir
    Oleiwi, Zahraa Ch.
    Al-Muqarm, Abbas M. Ali
    Al-Shammary, Dhiah
    Sufi, Fahim
    EVOLVING SYSTEMS, 2025, 16 (01)
  • [39] Smartphone malware detection model based on artificial immune system in cloud computing
    Wu, Bin
    Lin, Xing
    Li, Wei-Dong
    Lu, Tian-Liang
    Zhang, Dong-Mei
    Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (04): : 33 - 37
  • [40] A Review of Free Cloud-Based Anti-Malware Apps for Android
    Walls, Jason
    Choo, Kim-Kwang Raymond
    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 1053 - 1058