Abstract
Amid the rapid growth of Internet users, cybercrime is becoming one of the most challenging tasks for the systems and applications designers to deal with. The cybercrime threat is reflected in the increased number of cases and methods used by criminals. Systems based on cloud computing are natural targets due to their complexity (greater room for security weaknesses) and increasing popularity. Cloud computing is a modern technology that enables users to share resources in a virtual storage and computing environment. A cloud system is based on multiple physical servers. It provides a universal environment with a (large) number of Virtual Machines (VMs) that is available to many users accessing this system via the Internet. This form of access makes cloud systems weaker than physical networks. In order to prevent or minimize the number of attacks and in turn to secure data storage, any malicious behaviour such as external undesirable interventions should be rapidly identified and halted if possible. In this paper, we focus on the discovery of malicious behaviour via determining unwanted symptoms rather than via targeting particular malicious behaviours of the system directly. The main contribution of this paper consists in several new mechanisms for monitoring Virtual Machines and further experimental work targeting efficient ways of visiting VMs in order to discover malicious symptoms. We want to find the fastest and the best set of weights for visiting VMs.
| Original language | English (US) |
|---|---|
| Title of host publication | Proceedings of the 15th European Conference on Cyber Warfare and Security, ECCWS 2016 |
| Editors | Robert Koch, Gabi Dreo Rodosek |
| Publisher | Curran Associates Inc. |
| Pages | 9-17 |
| Number of pages | 9 |
| ISBN (Electronic) | 9781910810934 |
| State | Published - 2016 |
| Externally published | Yes |
| Event | 15th European Conference on Cyber Warfare and Security, ECCWS 2016 - Munich, Germany Duration: Jul 7 2016 → Jul 8 2016 |
Publication series
| Name | European Conference on Information Warfare and Security, ECCWS |
|---|---|
| Volume | 2016-January |
| ISSN (Print) | 2048-8602 |
| ISSN (Electronic) | 2048-8610 |
Conference
| Conference | 15th European Conference on Cyber Warfare and Security, ECCWS 2016 |
|---|---|
| Country/Territory | Germany |
| City | Munich |
| Period | 7/7/16 → 7/8/16 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Keywords
- Cloud computing
- Cloud monitoring
- Malicious behaviour
- Network patrolling
- Virtual Machines
ASJC Scopus subject areas
- Information Systems
- Information Systems and Management
- Safety, Risk, Reliability and Quality
Fingerprint
Dive into the research topics of 'Balancing mobility algorithm for monitoring virtual machines in clouds'. Together they form a unique fingerprint.Cite this
- APA
- Standard
- Harvard
- Vancouver
- Author
- BIBTEX
- RIS