skip to main content
10.1145/3297280.3297424acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

A robust and secure backup system for protecting malware

Published: 08 April 2019 Publication History

Abstract

As the development of information and communication technology is accelerating, malware threatening is continuously increasing. Regularly backing up data is essential to protecting data in the computing system against the growing number of malware by using the remote cloud servers or local Network Attached Storage(NAS) servers. However, the traditional cloud servers and NAS are not entirely safe for malware like ransomware. In this paper, we propose a robust and secure region-based backup system against malware attacks. The proposed backup system is divided into 3 regions: Un-safe, Middle, and Safe regions, depending on the risk of malware infections. The un-safe region is a common file system that is prone to malware attacks because it is mounted on the local machine. The safe region is isolated from the remote computer system over the Internet as well as the local computer system. The middle region is changed to the safe region only if this region is guaranteed that it is not infected with malware. We evaluate the reliability of the propose system based on the fault tolerance modeling.

References

[1]
U. Bayer, A. Moser, C. Kruegel and E. Kirda. 2006. Dynamic Analysis of Malicious Code. Journal in Computer Virology 2, 1 (Aug. 2006), 67--77
[2]
E. Gandotra, D. Bansal and S. Sofat. 2014. Malware Analysis and Classification: A Survey. Journal of Security 5, 2 (Apr. 2014), 56--64
[3]
Symantec. 2018 Internet Security Threat Report, https://www.symantec.com/content/dam/symantec/docs/reports/istr-23-executive-summary-en.pdf, Accessed : 2018-09-20
[4]
Zdnet, "What is Ransomware", https://www.zdnet.com/article/ransomware-an-executive-guide-to-one-of-the-biggest-menaces-on-the-web/, Accessed : 2018-9-20
[5]
SearchSecurity, "What is ransomware?", https://searchsecurity.techtarget.com/definition/ransomware, Accessed : 2018-9-20
[6]
S. Mohurle and M. Patil. 2017. A brief study of Wannacry Threat: Ransomware Attack 2017. International Journal of Advanced Research in Computer Science; Udaipur 8, 5 (May 2017), 1938--1940
[7]
Ars Technica. "NSA-leaking Shadow Brokers just dumped its most damaging release yet", https://arstechnica.com/information-technology/2017/04/nsa-leaking-shadow-brokers-just-dumped-its-most-damaging-release-yet/, Accessed : 2018-09-20
[8]
M. R. Watson, N. Shirazi, A. K. Marnerides, A. Mauthe and D. Hutchison. 2016. Malware Detection in Cloud Computing Infrastructures. IEEE Transactions on Dependable and Secure Computing 13, 2 (Apr. 2016), 192--205
[9]
Synology. "Protect yourself against encryption-based ransomware | Synology Inc.", https://www.synology.com/en-global/solution/ransomware, Accessed : 2018-09-20
[10]
QNAP, "Mitigate the threat of ransomware with QNAP NAS", https://www.qnap.com/solution/ransomware/en/, Accessed : 2018-09-20
[11]
Y. Jin, M. Tomoishi, S. Matsuura and Y. Kitaguchi. 2018. A Secure Container-based Backup Mechanism to Survive Destructive Ransomware Attacks. 2018 International Conference on Computing, Networking and Communications (ICNC), 1--6
[12]
Y. Ye, T. Li, D. Adjeroh and S. S. Iyengar. 2017. A survey on malware detection using data mining techniques. ACM Computing Surveys(CSUR) 50, 3 (Oct 2017), 41
[13]
R. K. Scott, J. W. Gault and D. F. McAllister. 1987. Fault-tolerant software reliability modeling. IEEE Transactions on Software Engineering SE-13, 5 (May 1987), 582--592

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing
April 2019
2682 pages
ISBN:9781450359337
DOI:10.1145/3297280
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 April 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. backup system. region based backup
  2. fault tolerant modeling
  3. file backup
  4. malware detection

Qualifiers

  • Research-article

Funding Sources

  • Ministry of Education

Conference

SAC '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 192
    Total Downloads
  • Downloads (Last 12 months)29
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media