From Malware Testing to Virtualization

被引:0
|
作者
Revay, Lukas [1 ]
机构
[1] VSB Tech Univ Ostrava, 17 Listopadu Str,15-2172, Ostrava 70833, Czech Republic
关键词
alpine; image; container; Qt5; framework; C plus; nmap; ssh; udp; LAN; worm;
D O I
10.1016/j.procs.2019.02.002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Viruses are everywhere around us. Not only in our environment but also in virtual environment we are now using on daily basis. To be able to predict their growth it is necessary to understand them or even to develop them. The main problem was how to get rid of any harm in computer or even infrastructure and still be possible to simulate infiltration. Of course it is not an infiltration from real deep point of view. This paper describes how this problem was handled, which type of malware was used, briefly introduces its implementation and also virtual environment this threat was tested. As preferred virtualization tool docker was chosen. Images created in docker and after then run as a containers fit to this work. Alpine was chosen as mini virtual docker image for our purposes. For implementation part C++ and a Qt5 framework was utilized to reduce the time with implementation which are already done. Frameworks or OS -es do not provide all important tools and this happened also in this case. Because of that some additional tools has been installed. Most of them are network based tools which are important for this work because this worm implementation communicates over the LAN and communication is on udp based packets. Result of this investigation is fully virtual platform which can be used for testing and improved also for other types of features related to viral usage. (C) 2019 The Authors. Published by Elsevier B.V.
引用
收藏
页码:751 / 756
页数:6
相关论文
共 50 条
  • [41] Four Fs of Anti-Malware Testing A practical approach to testing endpoint security products
    Edwards, Simon P. G.
    PROCEEDINGS OF THE 2013 IEEE WORKSHOP ON ANTI-MALWARE TESTING RESEARCH (WATER'13), 2013, : 1 - 9
  • [42] MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing
    Vadrevu, Phani
    Perdisci, Roberto
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 771 - 782
  • [43] Malware: From Modelling to Practical Detection
    Shyamasundar, R. K.
    Shah, Harshit
    Kumar, N. V. Narendra
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, PROCEEDINGS, 2010, 5966 : 21 - 39
  • [44] Towards Virtualization of Operational Technology to Enable Large-Scale System Testing
    Ansari, Shoaib
    Castro, Felipe
    Weller, Dennis
    Babazadeh, Davood
    Lehnhoff, Sebastian
    PROCEEDINGS OF 18TH INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES (IEEE EUROCON 2019), 2019,
  • [45] Camouflage in Malware: from Encryption to Metamorphism
    Rad, Babak Bashari
    Masrom, Maslin
    Ibrahim, Suhaimi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (08): : 74 - 83
  • [46] Medial projections - From interlink to virtualization of the cities
    Bohme, H
    NEUE RUNDSCHAU, 1998, 109 (02): : 64 - 76
  • [47] The Virtualization of SME Cluster from the Organizational Perspective
    Jiang Jianhua
    Hua Hui
    Li Hong
    PROCEEDINGS OF THE ELEVENTH WEST LAKE INTERNATIONAL CONFERENCE ON SMALL & MEDIUM BUSINESS, 2010, : 82 - 86
  • [48] Business Benefits from the Virtualization of an ICT Infrastructure
    Pogarcic, Ivan
    Krnjak, David
    Ozanic, Davor
    INTERNATIONAL JOURNAL OF ENGINEERING BUSINESS MANAGEMENT, 2012, 4
  • [49] From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models
    Compastie, Maxime
    Badonnel, Remi
    Festor, Olivier
    He, Ruan
    COMPUTERS & SECURITY, 2020, 97
  • [50] Virtualization
    Douglis, Fred
    Krieger, Orran
    IEEE INTERNET COMPUTING, 2013, 17 (02) : 6 - 9