A Randomized Generic Lucas Seed Algorithm (RGLSA) with Tail Boosting for Threat Modeling in Virtual Machines

This research paper will analyze security threats and proposes the self-propagating model of seeding attacks in cloud computing. Threat modeling on distributed and self-organizing systems is a very important modeling paradigm which discusses and analyzes the different ways malware may propagate in such systems. The paper introduces Randomized Generic Lucas Seed Algorithm (RGLSA) with TailBoosting which is based on Lucas and Fibonacci sequences. This is a model where the Virtual machines (hosts) could get infected rapidly by collaborative and recursive growth of the seeds generated in a random order. Tail boosting is introduced, for the first time so that in the scenario of the Cloud environment getting scaled up, the attack probabilities on VM’s don’t decrease drastically. The randomized growth of the seeds ensure that simulated attacks are free from a deterministic pattern and therefore, all the more challenging to be detected.

[1]  Kevin A. Kwiat,et al.  Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[2]  Christoph Meinel,et al.  Infrastructure as a service security: Challenges and solutions , 2010, 2010 The 7th International Conference on Informatics and Systems (INFOS).

[3]  Paulo Shakarian,et al.  A scalable heuristic for viral marketing under the tipping model , 2013, Social Network Analysis and Mining.

[4]  Jim Alves-Foss,et al.  Securing Database as a Service: Issues and Compromises , 2011, IEEE Security & Privacy.

[5]  Bharat Bhargava,et al.  Fibonacci Modeling of Malware Propagation , 2008 .

[6]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[7]  Brent Lagesse,et al.  Challenges in securing the interface between the cloud and pervasive systems , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[8]  Matthew M. Williamson,et al.  Implementing and Testing a Virus Throttle , 2003, USENIX Security Symposium.

[9]  Hari Balakrishnan,et al.  Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.

[10]  Vladimir A. Oleshchuk,et al.  Security and privacy in the cloud a long-term view , 2011, 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE).