Towards Malware Inspired Cloud Self-Protection

被引:3
作者
Benkhelifa, Elhadj [1 ]
Welsh, Tom [1 ]
机构
[1] Staffordshire Univ, Fac Comp Engn & Sci, Stoke On Trent, Staffs, England
来源
2014 INTERNATIONAL CONFERENCE ON CLOUD AND AUTONOMIC COMPUTING (ICCAC 2014) | 2014年
关键词
Cloud; Self-protection; Malware;
D O I
10.1109/ICCAC.2014.21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
with Cloud adoption becoming more widespread, the need to ensure the security of its environments becomes greater. It has previously been shown how such environments may enable a form of Cloud-aware malware which the current state-of-the art in defence does not take into account and would struggle to defend against. Therefore the contribution of this paper is in the proposal of using a similar architecture, based on complex malware to defend and protect a network due to its ability to exist in high levels of privilege and survive removal.
引用
收藏
页码:1 / 2
页数:2
相关论文
共 14 条
  • [1] [Anonymous], 2013, 2013 P IEEE SOUTHEAS
  • [2] Benkhelifa E., MULTILAYER CLO UNPUB
  • [3] Benkhelifa E., 2013 INT C IN PRESS
  • [4] Benkhelifa E., IEEE GLOB 2 IN PRESS
  • [5] Castaneda F., 2004, WORM 04, P83
  • [6] Lessons from Stuxnet
    Chen, Thomas M.
    Abu-Nimeh, Saeed
    [J]. COMPUTER, 2011, 44 (04) : 91 - 93
  • [7] Hubbard D., 2010, Top threats to cloud computing
  • [8] Jaeger D., 2011, CLOUD COMPUTING SECU, P1
  • [9] Virtualization: Issues, Security Threats, and Solutions
    Pearce, Michael
    Zeadally, Sherali
    Hunt, Ray
    [J]. ACM COMPUTING SURVEYS, 2013, 45 (02)
  • [10] Perez-Botero D., 2013, P 2013 INT WORKSHOP, P3, DOI [10.1145/2484402.2484406, DOI 10.1145/2484402.2484406]