The Experts below are selected from a list of 90 Experts worldwide ranked by ideXlab platform
Bernd Freisleben - One of the best experts on this subject based on the ideXlab platform.
-
PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
-
Malware detection and kernel rootkit prevention in cloud computing environments
Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
Jacky Keung - One of the best experts on this subject based on the ideXlab platform.
-
Empirical prediction models for adaptive resource provisioning in the cloud
Future Generation Computer Systems, 2020Co-Authors: Sadeka Islam, Jacky KeungAbstract:Cloud computing allows dynamic resource scaling for enterprise online transaction systems, one of the key characteristics that differentiates the cloud from the traditional computing paradigm. However, initializing a new Virtual Instance in a cloud is not instantaneous; cloud hosting platforms introduce several minutes delay in the hardware resource allocation. In this paper, we develop prediction-based resource measurement and provisioning strategies using Neural Network and Linear Regression to satisfy upcoming resource demands. Experimental results demonstrate that the proposed technique offers more adaptive resource management for applications hosted in the cloud environment, an important mechanism to achieve on-demand resource allocation in the cloud.
-
An empirical study into adaptive resource provisioning in the cloud
2010Co-Authors: Sadeka Islam, Jacky KeungAbstract:Cloud computing allows dynamic resource scaling for enterprise online transaction systems, one of the key characteristics that differentiates cloud from the traditional computing paradigm. However, initializing a new Virtual Instance in cloud is not instantaneous; the cloud hosting platforms introduce significant delay in the hardware resource allocation. In this paper, we develop prediction-based resource measurement and provisioning strategies using Neural Network and Linear Regression to satisfy upcoming resource demands. Experimental results demonstrate that the proposed technique offers more adaptive resource management for applications hosted in cloud environment, an important mechanism to achieve on-demand resource allocation in the cloud.
Matthias Schmidt - One of the best experts on this subject based on the ideXlab platform.
-
PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
-
Malware detection and kernel rootkit prevention in cloud computing environments
Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
Pablo Graubner - One of the best experts on this subject based on the ideXlab platform.
-
PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
-
Malware detection and kernel rootkit prevention in cloud computing environments
Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
David Bock - One of the best experts on this subject based on the ideXlab platform.
-
PDP - Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
2011 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.
-
Malware detection and kernel rootkit prevention in cloud computing environments
Proceedings - 19th International Euromicro Conference on Parallel Distributed and Network-Based Processing PDP 2011, 2011Co-Authors: Matthias Schmidt, Pablo Graubner, David Bock, Lars Baumgärtner, Bernd FreislebenAbstract:The commercial success of Cloud Computing and recent developments in Grid Computing have brought platform Virtualization technology into the field of high performance computing. Virtualization offers both more flexibility and security through custom user images and user isolation. In this paper, we present an approach for combined malware detection and kernel root kit prevention in Virtualized Cloud Computing environments. All running binaries in a Virtual Instance are intercepted and submitted to one or more analysis engines. Besides a complete check against a signature database, live introspection of all system calls is performed to detect yet unknown exploits or malware. Furthermore, to prevent that an intruder retains persistent control over a running Instance after a successful compromise, an in-kernel root kit prevention approach is proposed. Only authorized and thus trusted kernel modules are allowed to be loaded during runtime, loading of unauthorized modules is no longer possible. Finally, the performance of the presented solutions is evaluated.