2015
DOI: 10.1007/978-3-319-26148-5_40
|View full text |Cite
|
Sign up to set email alerts
|

CloudIDEA: A Malware Defense Architecture for Cloud Data Centers

Abstract: Abstract. Due to the proliferation of cloud computing, cloud-based systems are becoming an increasingly attractive target for malware. In an Infrastructure-as-a-Service (IaaS) cloud, malware located in a customer's virtual machine (VM) affects not only this customer, but may also attack the cloud infrastructure and other co-hosted customers directly. This paper presents CloudIDEA, an architecture that provides a security service for malware defense in cloud environments. It combines lightweight intrusion monit… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…Fischer et al 92 developed a structure to provide safety for malware protection in cloud settings. The lightweight attack observed by evidence collection, immediate separation, and thorough VM analysis of VMs was combined with the proposed algorithm on the dedicated analysis hosts.…”
Section: Virtual Machines or Hypervisor-based Intrusion Detection Systemmentioning
confidence: 99%
“…Fischer et al 92 developed a structure to provide safety for malware protection in cloud settings. The lightweight attack observed by evidence collection, immediate separation, and thorough VM analysis of VMs was combined with the proposed algorithm on the dedicated analysis hosts.…”
Section: Virtual Machines or Hypervisor-based Intrusion Detection Systemmentioning
confidence: 99%
“…[27] proposed a mechanism to verify the integrity of user and kernel code at runtime in page granularity. [50] described a framework that combines intrusion monitoring, evidence preservation, in-depth log analysis and decision making on suspicious events handling for guest VMs.…”
Section: A Vmi-based Intrusion Protectionmentioning
confidence: 99%
“…Certain current models which are capable of protecting the hypervisor in a range of scenarios as shown in Figure 1. The CloudIDEA's is used to identify malware injection attacks by monitoring and tracking Virtual Machines (10) . Virtual machines must be secured in case an attacker gains control and may affect the hypervisor (11) .…”
Section: Introductionmentioning
confidence: 99%