Classifying malware attacks in IaaS cloud environments

被引:30
|
作者
Rakotondravony, Noelle [1 ]
Taubmann, Benjamin [1 ]
Mandarawi, Waseem [1 ]
Weishaupl, Eva [2 ]
Xu, Peng [3 ]
Kolosnjaji, Bojan [3 ]
Protsenko, Mykolai [4 ]
de Meer, Hermann [1 ]
Reiser, Hans P. [1 ]
机构
[1] Univ Passau, Passau, Germany
[2] Univ Regensburg, Regensburg, Germany
[3] Tech Univ Munich, Munich, Germany
[4] Fraunhofer AISEC, Garching, Germany
来源
JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS | 2017年 / 6卷
关键词
IaaS; Malware; VM; Classification; VIRTUAL MACHINE INTROSPECTION; SECURITY ISSUES;
D O I
10.1186/s13677-017-0098-8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective detection and mitigation mechanisms. Virtual Machine Introspection (VMI) has been proven to be an effective tool for malware detection and analysis in virtualized environments. In this paper, we classify attacks in IaaS cloud that can be investigated using VMI-based mechanisms. This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud. Our classification methodology takes into consideration the source, target, and direction of the attacks. As each actor in a cloud environment can be both source and target of attacks, the classification provides any cloud actor the necessary knowledge of the different attacks by which it can threaten or be threatened, and consequently deploy adapted VMI-based monitoring architectures. To highlight the relevance of attacks, we provide a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Clustering-Based IaaS Cloud Monitoring
    Abdelsalam, Mahmoud
    Krishnan, Ram
    Sandhu, Ravi
    2017 IEEE 10TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2017, : 672 - 679
  • [32] Analysis on the Sequential Behavior of Malware Attacks
    Rosyid, Nur Rohman
    Ohrui, Masayuki
    Kikuchi, Hiroaki
    Sooraksa, Pitikhate
    Terada, Masato
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2139 - 2149
  • [33] A Survey on Adversarial Attacks for Malware Analysis
    Aryal, Kshitiz
    Gupta, Maanak
    Abdelsalam, Mahmoud
    Kunwar, Pradip
    Thuraisingham, Bhavani
    IEEE ACCESS, 2025, 13 : 428 - 459
  • [34] Iaas Cloud Selection using MCDM Methods
    Rehman, Zia Ur
    Hussain, Omar K.
    Hussain, Farookh K.
    2012 NINTH IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2012, : 246 - 251
  • [35] BAREBONE CLOUD IAAS: REVITALIZATION DISRUPTIVE TECHNOLOGY
    Soon, Joseph Ng Poh
    Wan, Wong See
    Yuen, Phan Koo
    Heng, Lim Ean
    Theam, Lim Jit
    Wei, Lee Siok
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND INDUSTRIAL ELECTRONICS (ISCAIE), 2014,
  • [36] UaaS: Software Update as a Service for the IaaS Cloud
    Liu, Kai
    Zou, Deqing
    Jin, Hai
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2015), 2015, : 483 - 490
  • [37] Steganographic attacks: The new frontier of Malware?
    Attacchi Steganografici: La nuova frontiera del Malware?
    Caviglione, Luca, 2017, Associazione Italiana per l'Informatica e il Calcolo Automatico (15):
  • [38] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [39] Analysis of Frameworks for Building IaaS Cloud Using by Cloud Computing Providers
    Mercl, Lubos
    Sec, David
    Sobeslav, Vladimir
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC-2017), 2018, 13 : 655 - 663
  • [40] Malware Development on Mobile Environments
    Papaleo, Gianluca
    Cambiaso, Enrico
    Patti, Luca
    Aiello, Maurizio
    2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 270 - 275