Classifying malware attacks in IaaS cloud environments

被引:30
|
作者
Rakotondravony, Noelle [1 ]
Taubmann, Benjamin [1 ]
Mandarawi, Waseem [1 ]
Weishaupl, Eva [2 ]
Xu, Peng [3 ]
Kolosnjaji, Bojan [3 ]
Protsenko, Mykolai [4 ]
de Meer, Hermann [1 ]
Reiser, Hans P. [1 ]
机构
[1] Univ Passau, Passau, Germany
[2] Univ Regensburg, Regensburg, Germany
[3] Tech Univ Munich, Munich, Germany
[4] Fraunhofer AISEC, Garching, Germany
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2017年 / 6卷
关键词
IaaS; Malware; VM; Classification; VIRTUAL MACHINE INTROSPECTION; SECURITY ISSUES;
D O I
10.1186/s13677-017-0098-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective detection and mitigation mechanisms. Virtual Machine Introspection (VMI) has been proven to be an effective tool for malware detection and analysis in virtualized environments. In this paper, we classify attacks in IaaS cloud that can be investigated using VMI-based mechanisms. This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud. Our classification methodology takes into consideration the source, target, and direction of the attacks. As each actor in a cloud environment can be both source and target of attacks, the classification provides any cloud actor the necessary knowledge of the different attacks by which it can threaten or be threatened, and consequently deploy adapted VMI-based monitoring architectures. To highlight the relevance of attacks, we provide a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Classifying malware attacks in IaaS cloud environments
    Noëlle Rakotondravony
    Benjamin Taubmann
    Waseem Mandarawi
    Eva Weishäupl
    Peng Xu
    Bojan Kolosnjaji
    Mykolai Protsenko
    Hermann de Meer
    Hans P. Reiser
    Journal of Cloud Computing, 6
  • [2] On Implementation of a KVM IaaS with Monitoring System on Cloud Environments
    Yang, Chao-Tung
    Chen, Bo-Han
    Chen, Wei-Sheng
    COMMUNICATION AND NETWORKING, PT I, 2011, 265 : 300 - 309
  • [3] Optimal control analysis of malware propagation in cloud environments
    Tian, Liang
    Shang, Fengjun
    Gan, Chenquan
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2023, 20 (08) : 14502 - 14517
  • [4] Efficient Update Activation for Virtual Machines in IaaS Cloud Computing Environments
    Yamada, Hiroshi
    Tonosaki, Shuntaro
    Kono, Kenji
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2014, E97D (03): : 469 - 479
  • [5] Predicting Future Malware Attacks on Cloud Systems using Machine Learning
    Patel, Vrushang
    Choe, Seungho
    Halabi, Talal
    2020 IEEE 6TH INT CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / 6TH IEEE INT CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) / 5TH IEEE INT CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2020, : 151 - 156
  • [6] Automatic verification technology of software patches for user virtual environments on IaaS cloud
    Yamato Y.
    Journal of Cloud Computing, 4 (1) : 1 - 14
  • [7] Classifying Android Malware through Subgraph Mining
    Martinelli, Fabio
    Saracino, Andrea
    Sgandurra, Daniele
    DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013, 2014, 8247 : 268 - 283
  • [8] Detection of Malware and Kernel-level Rootkits in Cloud Computing Environments
    Win, Thu Yein
    Tianfield, Huaglory
    Mair, Quentin
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 295 - 300
  • [9] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [10] MinCloud: Trusted and transferable MinHash-based framework for unknown malware detection for Linux cloud environments
    Panker, Tomer
    Cohen, Aviad
    Landman, Tom
    Bery, Chen
    Nissim, Nir
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 87