Classifying malware attacks in IaaS cloud environments

被引:30
|
作者
Rakotondravony, Noelle [1 ]
Taubmann, Benjamin [1 ]
Mandarawi, Waseem [1 ]
Weishaupl, Eva [2 ]
Xu, Peng [3 ]
Kolosnjaji, Bojan [3 ]
Protsenko, Mykolai [4 ]
de Meer, Hermann [1 ]
Reiser, Hans P. [1 ]
机构
[1] Univ Passau, Passau, Germany
[2] Univ Regensburg, Regensburg, Germany
[3] Tech Univ Munich, Munich, Germany
[4] Fraunhofer AISEC, Garching, Germany
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2017年 / 6卷
关键词
IaaS; Malware; VM; Classification; VIRTUAL MACHINE INTROSPECTION; SECURITY ISSUES;
D O I
10.1186/s13677-017-0098-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective detection and mitigation mechanisms. Virtual Machine Introspection (VMI) has been proven to be an effective tool for malware detection and analysis in virtualized environments. In this paper, we classify attacks in IaaS cloud that can be investigated using VMI-based mechanisms. This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud. Our classification methodology takes into consideration the source, target, and direction of the attacks. As each actor in a cloud environment can be both source and target of attacks, the classification provides any cloud actor the necessary knowledge of the different attacks by which it can threaten or be threatened, and consequently deploy adapted VMI-based monitoring architectures. To highlight the relevance of attacks, we provide a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] A strategy for enabling forensic investigation in cloud IaaS
    Meera, G.
    Alluri, B. K. S. P. Kumar Raju
    Powar, Digambar
    Geethakumari, G.
    2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRICAL, COMPUTER AND COMMUNICATION TECHNOLOGIES, 2015,
  • [22] Locking the sky: a survey on IaaS cloud security
    Luis M. Vaquero
    Luis Rodero-Merino
    Daniel Morán
    Computing, 2011, 91 : 93 - 118
  • [23] Automated Performance Benchmarking Platform of IaaS Cloud
    Liu, Xu
    Fang, Dongxu
    Xu, Peng
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 1402 - 1405
  • [24] Locking the sky: a survey on IaaS cloud security
    Vaquero, Luis M.
    Rodero-Merino, Luis
    Moran, Daniel
    COMPUTING, 2011, 91 (01) : 93 - 118
  • [25] Multicriteria Analysis for IaaS Cloud Providers Selection
    Rodrigues, Leonardo R.
    Koslovski, Guilherme P.
    Alves Junior, Omir C.
    PROCEEDINGS OF THE 14TH BRAZILIAN SYMPOSIUM ON INFORMATION SYSTEMS (SBSI2018), 2018, : 112 - 119
  • [26] Energy-saving scheduling on IaaS HPC cloud environments based on a multi-objective genetic algorithm
    Vila, Sergi
    Guirado, Fernando
    Lerida, Josep L.
    Cores, Fernando
    JOURNAL OF SUPERCOMPUTING, 2019, 75 (03) : 1483 - 1495
  • [27] Performability Analysis for IaaS Cloud Data Center
    Wang, Tianju
    Chang, Xiaolin
    Liu, Bo
    2016 17TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES (PDCAT), 2016, : 91 - 94
  • [28] Price Competition in a Duopoly IaaS Cloud Market
    Li, Xianwei
    Gu, Bo
    Zhang, Cheng
    Yamori, Kyoko
    Tanaka, Yoshiaki
    2014 16TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM (APNOMS), 2014,
  • [29] On the Feasibility of Malware Attacks in Smartphone Platforms
    Mylonas, Alexios
    Dritsas, Stelios
    Tsoumas, Bill
    Gritzalis, Dimitris
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 314 : 217 - 232
  • [30] FCM: an Architecture for Integrating IaaS Cloud Systems
    Marosi, Attila Csaba
    Kecskemeti, Gabor
    Kertesz, Attila
    Kacsuk, Peter
    CLOUD COMPUTING 2011: THE SECOND INTERNATIONAL CONFERENCE ON CLOUD COMPUTING, GRIDS, AND VIRTUALIZATION, 2011, : 7 - 12