Home > Research > Publications & Outputs > Malware analysis in cloud computing
View graph of relations

Malware analysis in cloud computing: network and system characteristics

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date12/2013
Host publicationGlobecom Workshops (GC Wkshps), 2013 IEEE
Place of PublicationPiscataway, N.J.
PublisherIEEE
Pages482-487
Number of pages6
<mark>Original language</mark>English
Event2013 IEEE Globecom Workshops - Atlanta, Georgia, United States
Duration: 9/12/201313/12/2013

Workshop

Workshop2013 IEEE Globecom Workshops
Country/TerritoryUnited States
CityAtlanta, Georgia
Period9/12/1313/12/13

Workshop

Workshop2013 IEEE Globecom Workshops
Country/TerritoryUnited States
CityAtlanta, Georgia
Period9/12/1313/12/13

Abstract

The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.