Direkt zum Inhalt

Rakotondravony, Noëlle ; Taubmann, Benjamin ; Mandarawi, Waseem ; Weishäupl, Eva ; Xu, Peng ; Kolosnjaji, Bojan ; Protsenko, Mykolai ; de Meer, Hermann ; Reiser, Hans

Classifying malware attacks in IaaS cloud environments

Rakotondravony, Noëlle, Taubmann, Benjamin, Mandarawi, Waseem, Weishäupl, Eva, Xu, Peng, Kolosnjaji, Bojan, Protsenko, Mykolai, de Meer, Hermann und Reiser, Hans (2017) Classifying malware attacks in IaaS cloud environments. Journal of Cloud Computing 6 (26).

Veröffentlichungsdatum dieses Volltextes: 19 Jan 2018 10:57
Artikel
DOI zum Zitieren dieses Dokuments: 10.5283/epub.36512


Zusammenfassung

In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the ...

In the last few years, research has been motivated to provide a categorization and classification of security concerns accompanying the growing adaptation of Infrastructure as a Service (IaaS) clouds. Studies have been motivated by the risks, threats and vulnerabilities imposed by the components within the environment and have provided general classifications of related attacks, as well as the respective detection and mitigation mechanisms. Virtual Machine Introspection (VMI) has been proven to be an effective tool for malware detection and analysis in virtualized environments. In this paper, we classify attacks in IaaS cloud that can be investigated using VMI-based mechanisms. This infers a special focus on attacks that directly involve Virtual Machines (VMs) deployed in an IaaS cloud. Our classification methodology takes into consideration the source, target, and direction of the attacks. As each actor in a cloud environment can be both source and target of attacks, the classification provides any cloud actor the necessary knowledge of the different attacks by which it can threaten or be threatened, and consequently deploy adapted VMI-based monitoring architectures. To highlight the relevance of attacks, we provide a statistical analysis of the reported vulnerabilities exploited by the classified attacks and their financial impact on actual business processes.



Beteiligte Einrichtungen


Details

DokumentenartArtikel
Titel eines Journals oder einer ZeitschriftJournal of Cloud Computing
Verlag:Springer
Band:6
Nummer des Zeitschriftenheftes oder des Kapitels:26
Datum2017
Zusätzliche Informationen (Öffentlich)First Online: 08 December 2017
InstitutionenWirtschaftswissenschaften > Institut für Wirtschaftsinformatik > Entpflichtete oder im Ruhestand befindliche Professoren > Professur für Wirtschaftsinformatik (Prof. Dr. Guido Schryen)
Stichwörter / KeywordsIaaS, Malware, VM, Classification
Dewey-Dezimal-Klassifikation000 Informatik, Informationswissenschaft, allgemeine Werke > 004 Informatik
StatusVeröffentlicht
BegutachtetJa, diese Version wurde begutachtet
An der Universität Regensburg entstandenZum Teil
URN der UB Regensburgurn:nbn:de:bvb:355-epub-365128
Dokumenten-ID36512

Bibliographische Daten exportieren

Nur für Besitzer und Autoren: Kontrollseite des Eintrags

nach oben