Dynamical Propagation Model of Malware for Cloud Computing Security

被引:21
作者
Gan, Chenquan [1 ]
Feng, Qingdong [1 ]
Zhang, Xulong [2 ]
Zhang, Zufan [1 ]
Zhu, Qingyi [3 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Shanxi Datong Univ, Sch Comp & Network Engn, Datong 037009, Peoples R China
[3] Chongqing Univ Posts & Telecommun, Sch Cyber Secur & Informat Law, Chongqing 400065, Peoples R China
关键词
Cloud computing security; virtual environment; malware; propagation model; dynamical behavior; VIRUS;
D O I
10.1109/ACCESS.2020.2968916
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-fog-edge computing especially cloud computing is providing a variety of services in many areas around the world and plays a vital role in cyber-physical-social systems (CPSS). Particularly, virtualization is one of main enabling technologies of cloud computing and realizes the dynamic deployment of computing tasks through the migration of virtual machines (VMs), so how to secure the virtual environment in the cloud is very crucial. The purpose of this paper is to address the issue of malware propagation among VMs under the infrastructure as a service (IaaS) architecture. Firstly, a dynamical propagation model is proposed to explore the important factors affecting the spread of malware, especially the impact of installing antivirus software in VMs. On this basis, a theoretical analysis for this model is investigated by means of differential dynamics, from which it is able to understand the dissemination behavior of malware under an infected cloud environment. Finally, some numerical simulations are conducted to verify the applicability and effectiveness of the proposed model.
引用
收藏
页码:20325 / 20333
页数:9
相关论文
共 32 条
[1]   Effect of anti-malware software on infectious nodes in cloud environment [J].
Abazari, Farzaneh ;
Analoui, Morteza ;
Takabi, Hassan .
COMPUTERS & SECURITY, 2016, 58 :139-148
[2]   Security in cloud computing: Opportunities and challenges [J].
Ali, Mazhar ;
Khan, Samee U. ;
Vasilakos, Athanasios V. .
INFORMATION SCIENCES, 2015, 305 :357-383
[3]  
[Anonymous], CLOUD COMPUTING
[4]  
Balduzzi Marco., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1427, DOI DOI 10.1145/2245276.2232005
[5]   NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems [J].
Chung, Chun-Jen ;
Khatkar, Pankaj ;
Xing, Tianyi ;
Lee, Jeongkeun ;
Huang, Dijiang .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) :198-211
[6]   Evaluating the Probability of Malicious Co-Residency in Public Clouds [J].
Ezhilchelvan, Paul Devadoss ;
Mitrani, Isi .
IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (03) :420-427
[7]   Dynamical analysis and control strategies on malware propagation model [J].
Feng, Liping ;
Liao, Xiaofeng ;
Han, Qi ;
Li, Huaqing .
APPLIED MATHEMATICAL MODELLING, 2013, 37 (16-17) :8225-8236
[8]   Sparse attention based separable dilated convolutional neural network for targeted sentiment analysis [J].
Gan, Chenquan ;
Wang, Lu ;
Zhang, Zufan ;
Wang, Zhangyi .
KNOWLEDGE-BASED SYSTEMS, 2020, 188
[9]   Global Dynamics and Optimal Control of a Viral Infection Model with Generic Nonlinear Infection Rate [J].
Gan, Chenquan ;
Yang, Maobin ;
Zhang, Zufan ;
Liu, Wanping .
DISCRETE DYNAMICS IN NATURE AND SOCIETY, 2017, 2017
[10]   A propagation model of computer virus with nonlinear vaccination probability [J].
Gan, Chenquan ;
Yang, Xiaofan ;
Liu, Wanping ;
Zhu, Qingyi .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) :92-100