Home > Research > Publications & Outputs > Malware analysis in cloud computing
View graph of relations

Malware analysis in cloud computing: network and system characteristics

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

Malware analysis in cloud computing: network and system characteristics. / Marnerides, Angelos; Watson, Michael; Shirazi, Syed Noor Ul Hassan et al.
Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J.: IEEE, 2013. p. 482-487.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Marnerides, A, Watson, M, Shirazi, SNUH, Mauthe, A & Hutchison, D 2013, Malware analysis in cloud computing: network and system characteristics. in Globecom Workshops (GC Wkshps), 2013 IEEE. IEEE, Piscataway, N.J., pp. 482-487, 2013 IEEE Globecom Workshops, Atlanta, Georgia, United States, 9/12/13. https://doi.org/10.1109/GLOCOMW.2013.6825034

APA

Vancouver

Marnerides A, Watson M, Shirazi SNUH, Mauthe A, Hutchison D. Malware analysis in cloud computing: network and system characteristics. In Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J.: IEEE. 2013. p. 482-487 doi: 10.1109/GLOCOMW.2013.6825034

Author

Marnerides, Angelos ; Watson, Michael ; Shirazi, Syed Noor Ul Hassan et al. / Malware analysis in cloud computing : network and system characteristics. Globecom Workshops (GC Wkshps), 2013 IEEE. Piscataway, N.J. : IEEE, 2013. pp. 482-487

Bibtex

@inproceedings{ffa8907a30ba49959d23fd068d61946b,
title = "Malware analysis in cloud computing: network and system characteristics",
abstract = "The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.",
author = "Angelos Marnerides and Michael Watson and Shirazi, {Syed Noor Ul Hassan} and Andreas Mauthe and David Hutchison",
year = "2013",
month = dec,
doi = "10.1109/GLOCOMW.2013.6825034",
language = "English",
pages = "482--487",
booktitle = "Globecom Workshops (GC Wkshps), 2013 IEEE",
publisher = "IEEE",
note = "2013 IEEE Globecom Workshops ; Conference date: 09-12-2013 Through 13-12-2013",

}

RIS

TY - GEN

T1 - Malware analysis in cloud computing

T2 - 2013 IEEE Globecom Workshops

AU - Marnerides, Angelos

AU - Watson, Michael

AU - Shirazi, Syed Noor Ul Hassan

AU - Mauthe, Andreas

AU - Hutchison, David

PY - 2013/12

Y1 - 2013/12

N2 - The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.

AB - The deployment of cloud computing environments is increasingly common, and we are implicitly reliant on them for many services. However, their dependence on virtualised computer and network infrastructures introduces risks related to system resilience. In particular, the virtualised nature of the cloud has not yet been thoroughly studied with respect to security issues including vulnerabilities and appropriate anomaly detection. This paper proposes an approach for the investigation and analysis of malware in virtualised environments. We carry out an analysis, on a system and network-wide scale, and further pinpoint some system and network features specifically by studying the example of the Kelihos malware.

U2 - 10.1109/GLOCOMW.2013.6825034

DO - 10.1109/GLOCOMW.2013.6825034

M3 - Conference contribution/Paper

SP - 482

EP - 487

BT - Globecom Workshops (GC Wkshps), 2013 IEEE

PB - IEEE

CY - Piscataway, N.J.

Y2 - 9 December 2013 through 13 December 2013

ER -