Effect of anti-malware software on infectious nodes in cloud environment

Introduce a novel approach to study fast propagation of malware in the cloud.Develop a dynamic mathematical model to analyze the effect of self-defending VMs.Predict whether the number of infected nodes in cloud decrease to zero or not.Calculate how many self-defended VM could clean the infrastructure of the cloud. A primary challenge of cloud computing is securing a virtualized environment. Virtual machine migration plays an important role in cloud infrastructure by enabling dynamic resource allocation and optimizing power consumption. However, it may adversely affect the security of the environment by facilitating the malware propagation process. In this paper, we introduce a novel approach to study the fast propagation of malware in the virtualized cloud environments. We develop Susceptible-Protected-Infected (SPI) cloud malware propagation model, a dynamic mathematical model to analyze the effect of self-defending VMs in the cloud environment with variable VM population and migration patterns. We analyze the proposed model using stability theory of differential equations and use epidemic modeling of malware propagation to evaluate strategies for malware propagation control. Finally, the experimental results confirm the validity of our analytical results.

[1]  W. O. Kermack,et al.  Contributions to the mathematical theory of epidemics—II. The problem of endemicity , 1991, Bulletin of mathematical biology.

[2]  J. B. Shukla,et al.  Modeling and analysis of the effects of antivirus software on an infected computer network , 2014, Appl. Math. Comput..

[3]  Anupama Sharma,et al.  Modeling and analysis of effects of awareness programs by media on the spread of infectious diseases , 2011, Math. Comput. Model..

[4]  J. Watmough,et al.  Reproduction numbers and sub-threshold endemic equilibria for compartmental models of disease transmission. , 2002, Mathematical biosciences.

[5]  Ashraf A. Shahin Polymorphic Worms Collection in Cloud Computing , 2014, ArXiv.

[6]  Engin Kirda,et al.  A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).

[7]  Anupama Sharma,et al.  Capturing the interplay between malware and anti-malware in a computer network , 2014, Appl. Math. Comput..

[8]  Yunkai Zhang,et al.  Stability analysis of an e-SEIAR model with point-to-group worm propagation , 2015, Commun. Nonlinear Sci. Numer. Simul..

[9]  William H. Sanders,et al.  Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment , 2010, SafeConfig '10.

[10]  David Hutchison,et al.  Malware analysis in cloud computing: Network and system characteristics , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[11]  W. O. Kermack,et al.  Contributions to the Mathematical Theory of Epidemics. II. The Problem of Endemicity , 1932 .

[12]  Paul D. Ezhilchelvan,et al.  Evaluating the Probability of Malicious Co-Residency in Public Clouds , 2017, IEEE Transactions on Cloud Computing.

[13]  Benny Rochwerger,et al.  Scalable Cloud Defenses for Detection, Analysis and Mitigation of DDoS Attacks , 2010, Future Internet Assembly.

[14]  Ralf Steinmetz,et al.  Threat as a Service?: Virtualization's Impact on Cloud Security , 2012, IT Professional.

[15]  Wayne A. Jansen,et al.  Cloud Hooks: Security and Privacy Issues in Cloud Computing , 2011, 2011 44th Hawaii International Conference on System Sciences.

[16]  Athanasios V. Vasilakos,et al.  Security in cloud computing: Opportunities and challenges , 2015, Inf. Sci..

[17]  Dijiang Huang,et al.  NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[18]  José Roberto Castilho Piqueira,et al.  Dynamic models for computer viruses , 2008, Comput. Secur..

[19]  Bimal Kumar Mishra,et al.  Effect of anti-virus software on infectious nodes in computer network: A mathematical model , 2012 .

[20]  Jianxin Li,et al.  CyberGuarder: A virtualization security assurance architecture for green cloud computing , 2012, Future Gener. Comput. Syst..

[21]  Dan C. Marinescu,et al.  Cloud Computing: Theory and Practice , 2013 .

[22]  Mark Coates,et al.  Epidemiological Modelling of Peer-to-Peer Viruses and Pollution , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[23]  Stefan Katzenbeisser,et al.  Detecting Computer Worms in the Cloud , 2011, iNetSeC.

[24]  Bimal Kumar Mishra,et al.  A mathematical model for a distributed attack on targeted resources in a computer network , 2014, Commun. Nonlinear Sci. Numer. Simul..

[25]  Bimal Kumar Mishra,et al.  Mathematical model on the transmission of worms in wireless sensor network , 2013 .

[26]  Navnit Jha,et al.  SEIQRS model for the transmission of malicious objects in computer network , 2010 .

[27]  Bimal Kumar Mishra,et al.  Dynamic model of worm propagation in computer network , 2014 .

[28]  David Hutchison,et al.  Towards a Distributed, Self-organising Approach to Malware Detection in Cloud Computing , 2013, IWSOS.