Have a personal or library account? Click to login
Strengthening Cloud Computing Security: A Malware Prevention and Detection Framework at the Hypervisor Level Cover

Strengthening Cloud Computing Security: A Malware Prevention and Detection Framework at the Hypervisor Level

Open Access
|Feb 2025

References

  1. Mell, P., & Grance, T. (2009). ‘The NIST Definition of Cloud Computing.’ NIST Information Technology Laboratory. Retrieved on May 2011 from http://www.nist.gov/itl/cloud/upload/cloud-def-v15.pdf.
  2. Ross A. Lumley (2010). ‘Cyber Security and Privacy in Cloud Computing: Multidisciplinary Research Problems in Business.’ The George Washington University, Report GW-CSPRI-2010-4, December, 1-10.
  3. Arockiam, L., Monikandan, S., Parthasarathy, G. (2011). ‘Cloud Computing: A Survey.’ International Journal of Internet Computing, ISSN No: 2231 – 6965, Volume-1, Issue-2, 26-33.
  4. Arockiam et al. (2014). ‘Security Framework to Ensure the Confidentiality of Outsourced Data in Public Cloud Storage.’ International Journal of Current Engineering and Technology, Vol.4, No.3 (June 2014), 1270.
  5. Modi, C., Acha, K. (2017). ‘Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review.’ J. Supercomput., 73(3), 1192–1234.
  6. National vulnerability database—search and statistics. (2017). [Online]. Available: https://nvd.nist.gov/vuln/data-feeds/.
  7. Li, S.-H., Yen, D.C., Chen, S.-C., Chen, P.S., Lu, W.-H., Cho, C.-C. (2015). ‘Effects of virtualization on information security.’ Comput. Stand. Interfaces, 42, 1–8.
  8. Malware statistics & trends report: AV-TEST. AV. (n.d.). [Online]. Available: https://www.av-test.org/en/statistics/malware/.
  9. Patil, R., Modi, C. (2018). ‘Designing an efficient framework for vulnerability assessment and patching (VAP) in virtual environment of cloud computing.’ J. Supercomput., 75(5), 2862–2889.
  10. Alyas, T., Alissa, K., Alqahtani, M., Faiz, T., Alsaif, S.A., Tabassum, N., Naqvi, H.H. (2022). ‘Multi-Cloud Integration Security Framework Using Honeypots.’ Mobile Information Systems, 2022, 2600712, 1-13. https://doi.org/10.1155/2022/2600712.
  11. Yunlong, F., & Jie, L. (2024). ‘Incentive approaches for cloud computing: challenges and solutions.’ Journal of Engineering and Applied Science (Online), 71(1), 51-. https://doi.org/10.1186/s44147-024-00389-8.
  12. Marnerides, A.K., Spachos, P., Chatzimisios, P., Mauthe, A.U. (2015). ‘Malware detection in the cloud under ensemble empirical mode decomposition.’ In 2015 International Conference on Computing, Networking and Communications (ICNC), 82–88.
  13. Fattori, A., Lanzi, A., Balzarotti, D., Kirda, E. (2015). ‘Hypervisor-based malware protection with accessminer.’ Comput. Secur., 52, 33–50.
  14. Watson, M.R., Marnerides, A.K., Mauthe, A., Hutchison, D., et al. (2016). ‘Malware detection in cloud computing infrastructures.’ IEEE Trans. DependableSecur. Comput., 13(2), 192–205.
  15. Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U. (2016). ‘Securing virtual machines from anomalies using program-behavior analysis in cloud environment.’ In 18th International Conference on Data Science and Systems (DSS), 991–998, IEEE.
  16. Xie, X., Wang, W. (2016). ‘Lightweight examination of dll environments in virtual machines to detect malware.’ In: 4th ACM International Workshop on Security in Cloud Computing, 10–16, ACM.
  17. Kumara, M.A., Jaidhar, C. (2017). ‘Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor.’ Digit. Investig., 23, 99–123.
  18. Jia, X., Zhou, G., Huang, Q., Zhang, W., Tian, D. (2017). ‘Findevasion: an effective environment-sensitive malware detection system for the cloud.’ In: International Conference on Digital Forensics and Cyber Crime, 3–17, Springer.
  19. Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U. (2017). ‘Vaed: Vmi assisted evasion detection approach for infrastructure as a service cloud.’ Concurr. Comput. Pract. Exp., 29(12), e4133.
  20. Xu, Z., Ray, S., Subramanyan, P., Malik, S. (2017). ‘Malware detection using machine learning based analysis of virtual memory access patterns.’ In: Proceedings of the conference on design, automation & test in Europe, 169–174, European Design and Automation Association.
  21. Joseph, L., Mukesh, R. (2018). ‘Detection of malware attacks on virtual machines for a self-heal approach in cloud computing using vm snapshots.’ J. Commun. Softw. Syst., 14(3), 249–257.
  22. Patil, R., Dudeja, H., & Modi, C. (2020). ‘Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing.’ Int. J. Inf. Secur., 19, 147–162.
  23. ‘Advanced Malware.’ WatchGuard Technologies, 29 Nov. 2016, www.watchguard.com/wgrd-solutions/security-threats/advanced-malware.
  24. Menéndez, Héctor D., et al. (2021). ‘Getting Ahead of the Arms Race: Hothousing the Coevolution of VirusTotal With a Packer.’ Entropy, 23(4), 395. https://doi.org/10.3390/e23040395.
  25. Erocarrera. (n.d.). ‘Pefile: Pefile Is a Python Module to Read and Work With PE (Portable Executable) Files.’ GitHub, github.com/erocarrera/pefile.git.
  26. ‘Ransomeware Affected File Extension.’ www.fileextensions.org/search/extensions/search/Ransomware/is_ true_search/1/sortBy/extension/order/asc/page/1.
  27. Miller, Michael (2010). Cloud Computing: Web-Based Applications That Change the Way You Work and Collaborate Online. QueKnowledge and Grids, 105-112.
  28. Zhou, Minqi et al. (2008). ‘Security and Privacy in Cloud Computing: A Survey.’ In Proceedings of Sixth International Conference on Semantics, Publications, First Printing, Augutst, 149-150.
  29. Kavin, B. P., Ganapathy, S., Kanimozhi, U., Kannan, A. (2020). ‘An Enhanced Security Framework for Secured Data Storage and Communications in Cloud Using ECC, Access Control and LDSA.’ Wireless Personal Communications, 115(2), pp.1107-1135.
  30. Tabrizchi, H., Rafsanjani, M. K. (2020). ‘A survey on security challenges in cloud computing: issues, threats, and solutions.’ The Journal of Supercomputing, 76(12), pp.9493-9532.
  31. Kumar, P. R., Raj, P. H., Jelciana, P. (2018). ‘Exploring data security issues and solutions in cloud computing.’ Proc Comput Sci, 125:691–697.
  32. Naik, N., Jenkins, P., Savage, N., Yang, L. (2019). ‘Cyberthreat Hunting - Part 2: Tracking Ransomware Threat Actors using Fuzzy Hashing and Fuzzy C-Means Clustering.’ In: 2019 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), New Orleans, LA, USA, pp. 1-6, doi: 10.1109/FUZZ-IEEE.2019.8858825.
  33. Wilson, R., Iftimie, I. (2021). ‘Emerging ransomeware threats: An anticipatory ethical analysis.’ In: 2021 IEEE International Symposium on Technology and Society (ISTAS), Waterloo, ON, Canada, pp. 1-1, doi: 10.1109/ISTAS52410.2021.9629211.
  34. Singh, J., Refaey, A., Koilpillai, J. (2020). ‘Adoption of the software-defined perimeter (sdp) architecture for infrastructure as a service.’ Canadian Journal of Electrical and Computer Engineering, 43(4), pp. 357-363.
  35. Sun, P. J. (2020). ‘Security and privacy protection in cloud computing: Discussions and challenges.’ Journal of Network and Computer Applications, 160, 102642.
  36. Kumar, R., Goyal, R. (2019). ‘On cloud security requirements, threats, vulnerabilities and countermeasures: A survey.’ Computer Science Review, 33, 1-48.
  37. Anamika, A., Satya, V. (2013). ‘Ransomware Anatomy, Impact, and Mitigation Strategies.’ The journal of Machine Intelligence Research Lab (MIR lab).
  38. Suyogita, S., Satya, V. (2013). ‘Federated Learning for GDPR.’ The journal of Machine Intelligence Research Lab (MIR lab).
  39. Damiani E., De Capitani di Vimercati S., Foresti S., Jajodia S., Paraboschi S., and Samarati P. (2005). ‘Metadata management in outsourced encrypted databases.’ Springer-Verlag, Lecture Notes in Computer Science, In Proceedings of the 2nd VLDB Workshop on Secure Data Management, Trondheim, Norway, September, 1-17.
  40. Neves, Fatima Trindade, Fernando Cruz Marta, Ana Maria Ramalho Correia, Miguel de Castro Neto (2011). ‘The Adoption of Cloud Computing by SMEs: Identifying and Coping with External Factors.’ 11a Conferência da Associação Portuguesa de Sistemas de Informação, October, 1-11.
  41. Rehman, A. u., Hussain, M. (2011). ‘Efficient Cloud Data Confidentiality for DaaS.’ International Journal of Advanced Science and Technology, Vol. 35, October, pp. 1-10.
  42. Chow, R., Golle, P., Jakobsson, M., Masuoka, R., Molina, J., Shi, E., Staddon, J. (2009). ‘Controlling Data in the Cloud: Outsourcing Computation without Outsourcing Control.’ In: Proceedings of the ACM workshop on Cloud computing security, November, pp. 85-90.
  43. Huang, J.-Y., Liao, I.-E. (2012). ‘A Searchable Encryption Scheme for Outsourcing Cloud Storage.’ COMNETSAT ’12, IEEE, pp. 142-146.
  44. Kamara, S., Papamanthou, P. (2006). ‘Parallel and Dynamic Searchable Symmetric Encryption.’ In: Proceedings of the 13th ACM conference on Computer and communications security, ACM, NY, USA, October, pp. 79–88.
  45. Huawei Technologies Co., Ltd. (2023). Cloud Computing Technology (1st ed. 2023.). Springer Nature Singapore. https://doi.org/10.1007/978-981-19-3026-3
  46. Qurashi, M. A. (2023). ‘Securing Hypervisors in Cloud Computing Environments against Malware Injection.’ Indian Journal of Science and Technology, 16(39), 3386-3393. https://doi.org/10.17485/IJST/v16i39.1913
  47. Ahmad, W., Rasool, A., Javed, A. R., Baker, T., Jalil, Z. (2022). ‘Cyber Security in IoT-Based Cloud Computing: A Comprehensive Survey.’ Electronics, 11(1), 16. https://doi.org/10.3390/electronics11010016
DOI: https://doi.org/10.2478/ias-2024-0013 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 180 - 196
Published on: Feb 20, 2025
Published by: Cerebration Science Publishing Co., Limited
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Anamika Agarwal, Satya Bhushan Verma, Bineet Kumar Gupta, Suyogita Singh, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.