Study On Effects Of Different Malware Attacks On The Virtual Machines And An Analysis Of The Detection Techniques
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
newline The rapid proliferation of Cloud Computing in the recent times has made it to
newline
newlinebe the most advanced enterprise technology, in terms of availability of
newline
newlineresources, accessibility, scalability and cost. There is an enormous increase in
newline
newlinethe security threats in most of the cloud components. This research focuses on
newline
newlinethe infrastructure layer of cloud, where attackers target the virtual machines
newline
newlineand its counterparts. Inter-Virtual Machine (VM) communication attack is a
newline
newlinethreat to the virtual machines, whereby virtual machines co-locating in the
newline
newlinesame physical host can attack other virtual machines. Thus, from the
newline
newlinecompromised virtual machines, attacks can propagate to the other virtual
newline
newlinemachines and the physical hosts.
newline
newlineIn order to address this issue, a system to automate the recovery of virtual
newline
newlinemachines through a self-heal approach has to be designed. This approach must
newline
newlineprovide an incident response and also increase the quality of service (QoS) of
newline
newlinethe virtual machines. Unlike most previous work which tried to eliminate
newline
newlinemalware attacks, a remedy to overcome malware attacks by a restoration
newline
newlineprocess is made appropriate throughout this research work. Specifically, the
newline
newlinemain contributions of the research include:
newline
newlineAn inter-VM communication attack scenario was modeled, to verify the attack
newline
newlinecoverage of the attacker, the attacker behavior, and thus the performance in the
newline
newlineutilization of the CPU was observed. Based on these metrics, the underlying
newline