Malware Containment in Cloud

被引:2
|
作者
Malvankar, Abhishek [1 ]
Payne, Joshua [2 ]
Budhraja, Karan K. [3 ]
Kundu, Ashish [1 ]
Chari, Suresh [1 ]
Mohania, Mukesh [4 ]
机构
[1] IBM Thomas J Watson Res Ctr, Yorktown Hts, NY 10598 USA
[2] Stanford Univ, Stanford, CA 94305 USA
[3] Univ Maryland Baltimore Cty, Baltimore, MD 21228 USA
[4] IIIT Delhi, Delhi, India
来源
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019) | 2019年
关键词
Malware; Containment; Cloud Computing; Blockchain; Dominance Frontier; Smart Contracts; Hyperledger; Graph Neural Networks; PROPAGATION; MODEL;
D O I
10.1109/TPS-ISA48467.2019.00036
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Malware is pervasive and poses serious threats to normal operation of business processes in cloud. Cloud computing environments typically have hundreds of hosts that are connected to each other, often with high risk trust assumptions and/or protection mechanisms that are not difficult to break. Malware often exploits such weaknesses, as its immediate goal is often to spread itself to as many hosts as possible. Detecting this propagation is often difficult to address because the malware may reside in multiple components across the software or hardware stack. In this scenario, it is usually best to contain the malware to the smallest possible number of hosts, and it's also critical for system administration to resolve the issue in a timely manner. Furthermore, resolution often requires that several participants across different organizational teams scramble together to address the intrusion. In this vision paper, we define this problem in detail. We then present our vision of decentralized malware containment and the challenges and issues associated with this vision. The approach of containment involves detection and response using graph analytics coupled with a blockchain framework. We propose the use of a dominance frontier for profile nodes which must be involved in the containment process. Smart contracts are used to obtain consensus amongst the involved parties. The paper presents a basic implementation of this proposal. We have further discussed some open problems related to our vision.
引用
收藏
页码:221 / 227
页数:7
相关论文
共 50 条
  • [41] CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud Environments
    Guri, Mordechai
    PROCEEDINGS OF THE 2023 EUROPEAN INTERDISCIPLINARY CYBERSECURITY CONFERENCE, EICC 2023, 2023, : 100 - 107
  • [42] Strengthening Cloud Computing Security: A Malware Prevention and Detection Framework at the Hypervisor Level
    Agarwal, Anamika
    Verma, Satya Bhushan
    Gupta, Bineet Kumar
    Singh, Suyogita
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2024, 19 (05): : 180 - 196
  • [43] Using Deep-Learning-based Memory Analysis for Malware Detection in Cloud
    Li, Huhua
    Zhan, Dongyang
    Liu, Tianrui
    Ye, Lin
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 1 - 6
  • [44] SoK: Cryptojacking Malware
    Tekiner, Ege
    Acar, Abbas
    Uluagac, A. Selcuk
    Kirda, Engin
    Selcuk, Ali Aydin
    2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 120 - 139
  • [45] DDoS victim service containment to minimize the internal collateral damages in cloud computing
    Somani, Gaurav
    Gaur, Manoj Singh
    Sanghi, Dheeraj
    Conti, Mauro
    Rajarajan, Muttukrishnan
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 165 - 179
  • [46] A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware
    Mirza, Qublai Khan Ali
    Mohi-ud-din, Ghulam
    Awan, Irfan
    IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016, 2016, : 754 - 761
  • [47] Supervised Deep Learning Vector Quantization to Detect MemCached DDOS Malware Attack on Cloud
    Arul E.
    Punidha A.
    SN Computer Science, 2021, 2 (2)
  • [48] Agent Based Intelligent Approach for the Malware Detection for Infected Cloud Data Storage Files
    Muthurajkumar, S.
    Vijayalakshmi, M.
    Ganapathy, S.
    Kannan, A.
    2015 SEVENTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2015,
  • [49] Malware Detection Modeling Systems
    Kumar, Rajesh
    Geetha, S.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ADVANCED COMPUTING (ICRTAC-CPS 2018), 2018, : 187 - 192
  • [50] Hiding Malware On Distributed Storage
    Moubarak, Joanna
    Chamoun, Maroun
    Filiol, Eric
    2019 IEEE JORDAN INTERNATIONAL JOINT CONFERENCE ON ELECTRICAL ENGINEERING AND INFORMATION TECHNOLOGY (JEEIT), 2019, : 720 - 725