Classifying malware attacks in IaaS cloud environments

被引:30
作者
Rakotondravony, Noelle [1 ]
Taubmann, Benjamin [1 ]
Mandarawi, Waseem [1 ]
Weishaupl, Eva [2 ]
Xu, Peng [3 ]
Kolosnjaji, Bojan [3 ]
Protsenko, Mykolai [4 ]
de Meer, Hermann [1 ]
Reiser, Hans P. [1 ]
机构
[1] Univ Passau, Passau, Germany
[2] Univ Regensburg, Regensburg, Germany
[3] Tech Univ Munich, Munich, Germany
[4] Fraunhofer AISEC, Garching, Germany
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2017年 / 6卷
关键词
IaaS; Malware; VM; Classification; VIRTUAL MACHINE INTROSPECTION; SECURITY ISSUES;
D O I
10.1186/s13677-017-0098-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective detection and mitigation mechanisms. Virtual Machine Introspection (VMI) has been proven to be an effective tool for malware detection and analysis in virtualized environments. In this paper, we classify attacks in IaaS cloud that can be investigated using VMI-based mechanisms. This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud. Our classification methodology takes into consideration the source, target, and direction of the attacks. As each actor in a cloud environment can be both source and target of attacks, the classification provides any cloud actor the necessary knowledge of the different attacks by which it can threaten or be threatened, and consequently deploy adapted VMI-based monitoring architectures. To highlight the relevance of attacks, we provide a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.
引用
收藏
页数:12
相关论文
共 48 条
[1]   Secure Live Virtual Machines Migration: Issues and Solutions [J].
Aiash, Mahdi ;
Mapp, Glenford ;
Gemikonakli, Orhan .
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, :160-165
[2]   Virtual CPU Validation [J].
Amit, Nadav ;
Tsafrir, Dan ;
Schuster, Assaf ;
Ayoub, Ahmad ;
Shlomo, Iran .
SOSP'15: PROCEEDINGS OF THE TWENTY-FIFTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, 2015, :311-327
[3]  
Anala MR, 2013, 2013 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P243, DOI 10.1109/ICACCI.2013.6637178
[4]  
[Anonymous], P ANN S INF ASS ASIA
[5]  
[Anonymous], 2016, P 2016 ACM SIGSAC C
[6]  
[Anonymous], 2003, P NETW DISTR SYST SE
[7]  
[Anonymous], NOT 9 CLOUD COMP TOP
[8]  
[Anonymous], 2008, Preventing and Detecting Xen Hypervisor Subversions
[9]   From Security to Assurance in the Cloud: A Survey [J].
Ardagna, Claudio A. ;
Asal, Rasool ;
Damiani, Ernesto ;
Quang Hieu Vu .
ACM COMPUTING SURVEYS, 2015, 48 (01)
[10]   CloudVMI: Virtual Machine Introspection as a Cloud Service [J].
Baek, Hyun-wook ;
Srivastava, Abhinav ;
Van der Merwe, Jacobus .
2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, :153-158