{"title":"在云计算环境中检测蠕虫攻击:概念证明","authors":"Hasan Mahmoud Kanaker, M. Saudi, M. F. Marhusin","doi":"10.1109/ICSGRC.2014.6908732","DOIUrl":null,"url":null,"abstract":"Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently.","PeriodicalId":367680,"journal":{"name":"2014 IEEE 5th Control and System Graduate Research Colloquium","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"Detecting worm attacks in cloud computing environment: Proof of concept\",\"authors\":\"Hasan Mahmoud Kanaker, M. Saudi, M. F. Marhusin\",\"doi\":\"10.1109/ICSGRC.2014.6908732\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently.\",\"PeriodicalId\":367680,\"journal\":{\"name\":\"2014 IEEE 5th Control and System Graduate Research Colloquium\",\"volume\":\"74 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-09-25\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE 5th Control and System Graduate Research Colloquium\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSGRC.2014.6908732\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 5th Control and System Graduate Research Colloquium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSGRC.2014.6908732","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting worm attacks in cloud computing environment: Proof of concept
Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently.