Browse > Article
http://dx.doi.org/10.13089/JKIISC.2017.27.3.579

Design of Malicious Traffic Dynamic Analysis System in Cloud Environment  

Lee, Eun-Ji (ISAA Lab., Department of Computer Engineering, Ajou University)
Kwak, Jin (Department of Cyber Security, Ajou University)
Abstract
The cloud environment is hypervisor-based, and many virtual machines are interconnected, which makes propagation of malicious code easier than other environments. Accordingly, this paper proposes a malicious traffic dynamic analysis system for secure cloud environment. The proposed system continuously monitors and analyzes malicious activity in an isolated virtual network environment by distinguishing malicious traffic that occurs in a cloud environment. In addition, the analyzed results are reflected in the distinguishment and analysis of malicious traffic that occurs in the future. The goal of this research is secure and efficient malicious traffic dynamic analysis by constructing the malicious traffic analysis environment in the cloud environment for detecting and responding to the new and variant malicious traffic generated in the cloud environment.
Keywords
Cloud; Malware Analysis; Security;
Citations & Related Records
연도 인용수 순위
  • Reference
1 KISA, "2016 internet and information security top ten issues outlook", Dec. 2015
2 Shin Yeong-Sang, "Hypervisor-based virtualization security technology trend in the cloud environment", Jul. 2014
3 DDaily, 2010, http://www.ddaily.co.kr/news/article.html?no=67684
4 Mariano Graziano, Corrado Leita, Davide Balzarotti, "Towards Network Containment in Malware Analysis Systems", ACSAC '12 Proceedings of the 28th Annual Computer Security Applications Conference, pp.339-348, Dec. 2012
5 H. Binsalleeh, T.Ormerod, A. Boukhtouta et al., "On the Analysis of the Zeus Botnet Crimeware Toolkit", Eighth Annual International Conference on Privacy, Security and Trust, Aug. 2010
6 Baek Seung-Hun, "Open vSwitch packet processing structure", PIOLINK, Mar. 2015
7 http://openvswitch.org/releases/NEWS-2.5.0
8 Justin Pettit, Thomas Graf, "Stateful Connection Tracking & Stateful NAT", Nov. 2014
9 Laheeb Mohammed Ibrahim, Karam H. Thanon, "Analysis and Detection of the Zeus Botnet Crimeware", International Journal of Computer Science and Information Security, Vol. 13, No. 9, Sep. 2015
10 A-Young Son, Eui-Nam Huh, "A Study on migration for QoS in cloud computing", Proceedings of Symposium of the Korean Institute of communications and Information Sciences, Jan. 2016
11 Babak Yadegari, Brian Johannesmeyer, Benjamin Whitely et al., "A Generic Approach to Automatic Deobfuscation of Executable Code" 2015 IEEE Symposium on Security and Privacy, May. 2015
12 AhnLab, 2016, http://www.ahnlab.com/kr/site/product/cloudMss.do