Detecting worm attacks in cloud computing environment: Proof of concept

Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, ap...

Full description

Saved in:
Bibliographic Details
Main Authors: H.M., Kanaker, M.M., Saudi, M.F., Marhusin
Format: Conference Paper
Language:en_US
Published: Institute of Electrical and Electronics Engineers Inc. 2015
Subjects:
Online Access:http://ddms.usim.edu.my/handle/123456789/9179
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.usim-9179
record_format dspace
spelling my.usim-91792015-08-25T03:12:08Z Detecting worm attacks in cloud computing environment: Proof of concept H.M., Kanaker M.M., Saudi M.F., Marhusin cloud computing Detection Dynamic Analysis Reverse Engineering Worm Attacks Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently. 2015-08-25T03:12:08Z 2015-08-25T03:12:08Z 2014 Conference Paper 9781-4799-5692-0 http://ddms.usim.edu.my/handle/123456789/9179 en_US Institute of Electrical and Electronics Engineers Inc.
institution Universiti Sains Islam Malaysia
building USIM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universit Sains Islam i Malaysia
content_source USIM Institutional Repository
url_provider http://ddms.usim.edu.my/
language en_US
topic cloud computing
Detection
Dynamic Analysis
Reverse Engineering
Worm Attacks
spellingShingle cloud computing
Detection
Dynamic Analysis
Reverse Engineering
Worm Attacks
H.M., Kanaker
M.M., Saudi
M.F., Marhusin
Detecting worm attacks in cloud computing environment: Proof of concept
description Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently.
format Conference Paper
author H.M., Kanaker
M.M., Saudi
M.F., Marhusin
author_facet H.M., Kanaker
M.M., Saudi
M.F., Marhusin
author_sort H.M., Kanaker
title Detecting worm attacks in cloud computing environment: Proof of concept
title_short Detecting worm attacks in cloud computing environment: Proof of concept
title_full Detecting worm attacks in cloud computing environment: Proof of concept
title_fullStr Detecting worm attacks in cloud computing environment: Proof of concept
title_full_unstemmed Detecting worm attacks in cloud computing environment: Proof of concept
title_sort detecting worm attacks in cloud computing environment: proof of concept
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2015
url http://ddms.usim.edu.my/handle/123456789/9179
_version_ 1645152557627080704
score 13.222552