Skip to main content

2015 | OriginalPaper | Buchkapitel

4. Understanding the Resilience of Mobile Cloud Services to Malware

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this chapter, we aim to measure the resilience of mobile cloud services to malware. Since the cloud is intended to provide real-time services to mobile users, we introduce a new metric, resilience factor, to denote the maximally allowable percentage of malware-infected nodes in the network such that a required ratio of cloud service requests can still be processed on time. We find that for mobile cloud services, there exists a cutoff point on network bandwidth B, below which the resilience factor is an increasing function of B, and beyond which the resilience factor decreases on the order of 1∕B. Such a dichotomy demonstrates another perspective on developing network infrastructures for mobile cloud computing: although low bandwidth in current cellular networks is viewed as a primary drawback to support mobile cloud services, increasing bandwidth can, on the other hand, jeopardize malware resilience. In addition, we show via experiments that in malware epidemics, if B is less than the cutoff point, service quality is deteriorated mainly by network congestion (especially at mobility hotspots), thereby leading to heterogeneous malware resilience across the network; if B is larger than the cutoff point, malware-induced cloud overload becomes the performance bottleneck that can result in global service degradation. Our results encourage deployment of countermeasures in both the network and cloud to effectively defend against malware attacks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Angin P, Bhargava BK (2011) Real-time mobile-cloud computing for context-aware blind navigation. Int J Next Gener Comput 2:1–13 Angin P, Bhargava BK (2011) Real-time mobile-cloud computing for context-aware blind navigation. Int J Next Gener Comput 2:1–13
2.
Zurück zum Zitat Bahl P, Han RY, Li LE, Satyanarayanan M (2012) Advancing the state of mobile cloud computing. In: Proceedings of ACM workshop on mobile cloud computing & servicesCrossRef Bahl P, Han RY, Li LE, Satyanarayanan M (2012) Advancing the state of mobile cloud computing. In: Proceedings of ACM workshop on mobile cloud computing & servicesCrossRef
3.
Zurück zum Zitat Bhadauria R, Sanyal S (2012) Survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 47:47–66 Bhadauria R, Sanyal S (2012) Survey on security issues in cloud computing and associated mitigation techniques. Int J Comput Appl 47:47–66
4.
Zurück zum Zitat Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535–547CrossRef Bianchi G (2000) Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J Sel Areas Commun 18(3):535–547CrossRef
5.
Zurück zum Zitat Chun BG, Maniatis P (2010) Dynamically partitioning applications between weak devices and clouds. In: Proceedings of ACM workshop on mobile cloud computing & servicesCrossRef Chun BG, Maniatis P (2010) Dynamically partitioning applications between weak devices and clouds. In: Proceedings of ACM workshop on mobile cloud computing & servicesCrossRef
6.
Zurück zum Zitat Constantinescu L, Kim J, Feng D (2012) SparkMed: a framework for dynamic integration of multimedia medical data into distributed m-health systems. IEEE Trans Inf Technol Biomed 16(1):40–52CrossRef Constantinescu L, Kim J, Feng D (2012) SparkMed: a framework for dynamic integration of multimedia medical data into distributed m-health systems. IEEE Trans Inf Technol Biomed 16(1):40–52CrossRef
7.
Zurück zum Zitat Cox PA (2011) Build a more secure, mobile cloud environment – common mobile cloud vulnerabilities and solutions to secure them. developerWorks Cox PA (2011) Build a more secure, mobile cloud environment – common mobile cloud vulnerabilities and solutions to secure them. developerWorks
8.
Zurück zum Zitat Cuervo E, Balasubramanian A, ki Cho D (2010) MAUI: making smartphones last longer with code offload. In: Proceedings of ACM Mobisys 2010 Cuervo E, Balasubramanian A, ki Cho D (2010) MAUI: making smartphones last longer with code offload. In: Proceedings of ACM Mobisys 2010
9.
Zurück zum Zitat Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13:1587–1611CrossRef Dinh HT, Lee C, Niyato D, Wang P (2011) A survey of mobile cloud computing: architecture, applications, and approaches. Wirel Commun Mob Comput 13:1587–1611CrossRef
10.
Zurück zum Zitat Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of ACM workshop on security and privacy in smartphones and mobile devicesCrossRef Felt AP, Finifter M, Chin E, Hanna S, Wagner D (2011) A survey of mobile malware in the wild. In: Proceedings of ACM workshop on security and privacy in smartphones and mobile devicesCrossRef
12.
Zurück zum Zitat Iosup A, Yigitbasi N, Epema D (2011) On the performance variability of production cloud services. In: Proceedings of IEEE/ACM international symposium on cluster, cloud and grid computingCrossRef Iosup A, Yigitbasi N, Epema D (2011) On the performance variability of production cloud services. In: Proceedings of IEEE/ACM international symposium on cluster, cloud and grid computingCrossRef
13.
Zurück zum Zitat Jung E, Wang Y, Prilepov I, Maker F, Liu X, Akella V (2010) User-profile-driven collaborative bandwidth sharing on mobile phones. In: Proceedings of ACM workshop on mobile cloud computing & servicesCrossRef Jung E, Wang Y, Prilepov I, Maker F, Liu X, Akella V (2010) User-profile-driven collaborative bandwidth sharing on mobile phones. In: Proceedings of ACM workshop on mobile cloud computing & servicesCrossRef
14.
Zurück zum Zitat Juniper Networks (2011) Malicious mobile threats report 2010/2011 Juniper Networks (2011) Malicious mobile threats report 2010/2011
15.
Zurück zum Zitat Kavulya S, Tan J, Gandhi R, Narasimhan P (2010) An analysis of traces from a production MapReduce cluster. In: Proceedings of IEEE/ACM international conference on cluster, cloud and grid computingCrossRef Kavulya S, Tan J, Gandhi R, Narasimhan P (2010) An analysis of traces from a production MapReduce cluster. In: Proceedings of IEEE/ACM international conference on cluster, cloud and grid computingCrossRef
16.
Zurück zum Zitat Khouzani MR, Sarkar S, Altman E (2011) A dynamic game solution to malware attack. In: Proceedings of IEEE INFOCOM ’11 Khouzani MR, Sarkar S, Altman E (2011) A dynamic game solution to malware attack. In: Proceedings of IEEE INFOCOM ’11
17.
Zurück zum Zitat Kounelis I, Lochner J, Shaw D, Scheer S (2012) Security of service requests for cloud based m-commerce. In: Proceedings of international convention MIPRO ’12 Kounelis I, Lochner J, Shaw D, Scheer S (2012) Security of service requests for cloud based m-commerce. In: Proceedings of international convention MIPRO ’12
18.
Zurück zum Zitat Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43:51–56CrossRef Kumar K, Lu YH (2010) Cloud computing for mobile users: can offloading computation save energy? Computer 43:51–56CrossRef
19.
Zurück zum Zitat Lookout Mobile Security (2011) Mobile threat report Lookout Mobile Security (2011) Mobile threat report
20.
Zurück zum Zitat McAfee Labs (2011) McAfee threats report: third quarter 2011 McAfee Labs (2011) McAfee threats report: third quarter 2011
21.
Zurück zum Zitat Mulliner C, Seifert JP (2010) Rise of the iBots: owning a telco network. In: Proceedings of international conference on malicious and unwanted software Mulliner C, Seifert JP (2010) Rise of the iBots: owning a telco network. In: Proceedings of international conference on malicious and unwanted software
22.
Zurück zum Zitat Ra M, Sheth A, Mummert L, Pillai P, Wetherall D, Govindan R (2011) Odessa: enabling interactive perception applications on mobile devices. In: Proceedings of ACM Mobisys 2011 Ra M, Sheth A, Mummert L, Pillai P, Wetherall D, Govindan R (2011) Odessa: enabling interactive perception applications on mobile devices. In: Proceedings of ACM Mobisys 2011
23.
Zurück zum Zitat Rhee I, Shin M, Hong S, Lee K, Kim S, Chong S (2009) CRAWDAD data set ncsu/mobilitymodels (v. 2009-07-23) Rhee I, Shin M, Hong S, Lee K, Kim S, Chong S (2009) CRAWDAD data set ncsu/mobilitymodels (v. 2009-07-23)
25.
Zurück zum Zitat Tan J, Meng X, Zhang L (2012) Performance analysis of coupling scheduler for MapReduce/Hadoop. In: Proceedings of IEEE INFOCOM ’12 Tan J, Meng X, Zhang L (2012) Performance analysis of coupling scheduler for MapReduce/Hadoop. In: Proceedings of IEEE INFOCOM ’12
26.
Zurück zum Zitat Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, Porta TL (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of ACM conference on computer and communications security (CCS) Traynor P, Lin M, Ongtang M, Rao V, Jaeger T, McDaniel P, Porta TL (2009) On cellular botnets: measuring the impact of malicious devices on a cellular network core. In: Proceedings of ACM conference on computer and communications security (CCS)
27.
Zurück zum Zitat Xiao Y, Hui P, Savolainen P (2011) CasCap: cloud-assisted context-aware power management for mobile devices. In: Proceedings of the second international workshop on mobile cloud computing and servicesCrossRef Xiao Y, Hui P, Savolainen P (2011) CasCap: cloud-assisted context-aware power management for mobile devices. In: Proceedings of the second international workshop on mobile cloud computing and servicesCrossRef
28.
Zurück zum Zitat Zohar E, Cidon I, Mokryn O (2011) The power of prediction: cloud bandwidth and cost reduction. In: Proceedings of ACM SIGCOMM ’11 Zohar E, Cidon I, Mokryn O (2011) The power of prediction: cloud bandwidth and cost reduction. In: Proceedings of ACM SIGCOMM ’11
Metadaten
Titel
Understanding the Resilience of Mobile Cloud Services to Malware
verfasst von
Zhuo Lu
Wenye Wang
Cliff Wang
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-23288-1_4