Skip to main content

2015 | OriginalPaper | Buchkapitel

A New Methodology Based on Cloud Computing for Efficient Virus Detection

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Antivirus software programs use specific techniques to detect computer viruses, malware and other network threats. The basic, most common and oldest antivirus detection technique is “virus signature scanning”, whereby antivirus programs use unique byte sequences for each virus so as to identify potential presence of malicious code in each file investigation procedure. Despite its advantages, this technique has many weaknesses that are highlighted in this paper. In lieu, this paper proposes a new hybrid security model for optimized protection and better virus detection, which merges the “Sandboxing Method”, “System-Changes-based Signatures” and “Cloud Computing”.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alisa Shevchenko, “Malicious Code Detection Technologies”, Kaspersky Lab, 2008. Alisa Shevchenko, “Malicious Code Detection Technologies”, Kaspersky Lab, 2008.
2.
Zurück zum Zitat Neamtu Iosif Mircea, “Software Tools to Detect Files”, Dept. Of Informatics, Faculty of Science, Lucian Blaga University of Sibiu, Sibiu, 2011. Neamtu Iosif Mircea, “Software Tools to Detect Files”, Dept. Of Informatics, Faculty of Science, Lucian Blaga University of Sibiu, Sibiu, 2011.
3.
Zurück zum Zitat Ionut Ilascu, “The Insides of Panda Cloud Antivirus”, May 2009. Ionut Ilascu, “The Insides of Panda Cloud Antivirus”, May 2009.
4.
Zurück zum Zitat P. Szor, “The Art of Computer Virus Research and Defense”, Addison-Wesley Professional, Boston, MA (2005). P. Szor, “The Art of Computer Virus Research and Defense”, Addison-Wesley Professional, Boston, MA (2005).
5.
Zurück zum Zitat E. Filiol, “Computer Viruses: from theory to applications”, Springer-Verlag France 2005. E. Filiol, “Computer Viruses: from theory to applications”, Springer-Verlag France 2005.
6.
Zurück zum Zitat Essam Al Daoud, Iqbal H. Jebril and Belal Zaqaibeh, “Computer Virus Strategies and Detection Methods”, Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008. Essam Al Daoud, Iqbal H. Jebril and Belal Zaqaibeh, “Computer Virus Strategies and Detection Methods”, Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008.
7.
Zurück zum Zitat In Seon Yoo and Ulrich Ultes-Nitsche, “ Non-signature based virus detection Towards establishing a unknown virus detection technique using SOM “, Journal in Computer Virology, 2006, Volume 2, Number 3, Pages 163-186. In Seon Yoo and Ulrich Ultes-Nitsche, Non-signature based virus detection Towards establishing a unknown virus detection technique using SOM , Journal in Computer Virology, 2006, Volume 2, Number 3, Pages 163-186.
8.
Zurück zum Zitat Min Feng and Rajiv Gupta, “Detecting Virus Mutations Via Dynamic Matching”, CSE Dept., University of California, Riverside, IEEE International Conference on Software Maintenance, September 2009. Min Feng and Rajiv Gupta, “Detecting Virus Mutations Via Dynamic Matching”, CSE Dept., University of California, Riverside, IEEE International Conference on Software Maintenance, September 2009.
9.
Zurück zum Zitat Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala, “Malware detection using assembly and API call sequences”, Journal in Computer Virology, Vol. 7, Issue 2, pp 107-119, May 2011. Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala, “Malware detection using assembly and API call sequences”, Journal in Computer Virology, Vol. 7, Issue 2, pp 107-119, May 2011.
10.
Zurück zum Zitat Sunita Kanaujiya, Dr. S. P. Tripathi, N. C. Sharma, “Improving Speed of the Signature Scanner using BMH Algorithm”, Vol. 11, No. 4, International Journal of Computer Applications (0975-8887), December 2010. Sunita Kanaujiya, Dr. S. P. Tripathi, N. C. Sharma, “Improving Speed of the Signature Scanner using BMH Algorithm”, Vol. 11, No. 4, International Journal of Computer Applications (0975-8887), December 2010.
11.
Zurück zum Zitat Umakant Mishra, “Overcoming limitations of Signature scanning – Applying TRIZ to Improve Anti-Virus Programs”, TRIZsite Journal, April 2007. Umakant Mishra, “Overcoming limitations of Signature scanning – Applying TRIZ to Improve Anti-Virus Programs”, TRIZsite Journal, April 2007.
12.
Zurück zum Zitat Babak Bashari Rad, Maslin Masrom and Suhaimi Ibrahim, “Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011. Babak Bashari Rad, Maslin Masrom and Suhaimi Ibrahim, “Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011.
13.
Zurück zum Zitat Liam Tung, “Anti-virus can’t keep up with threat onslaught”, April 2012. Liam Tung, “Anti-virus can’t keep up with threat onslaught”, April 2012.
14.
Zurück zum Zitat Umakant Mishra,”Eliminating False Positives in Virus Scanning”, Bangalore, India, 2013. Umakant Mishra,”Eliminating False Positives in Virus Scanning”, Bangalore, India, 2013.
15.
Zurück zum Zitat Randy Abrams, “Understanding Heuristics”, AVAR Conference, Seoul, 2007. Randy Abrams, “Understanding Heuristics”, AVAR Conference, Seoul, 2007.
16.
Zurück zum Zitat Margaret Rouse, “Stealth Virus”, SearchSecurity TechTarget, September 2005. Margaret Rouse, “Stealth Virus”, SearchSecurity TechTarget, September 2005.
17.
Zurück zum Zitat Bertrand Anckaert, Matias Madou, Koen De Bosschere, “A Model for Self-Modifying Code”, Electronics and Information Systems Dept, Ghent University, Ghent, 2006. Bertrand Anckaert, Matias Madou, Koen De Bosschere, “A Model for Self-Modifying Code”, Electronics and Information Systems Dept, Ghent University, Ghent, 2006.
18.
Zurück zum Zitat Carey Nachenberg, “Computer Virus-Coevolution”, Communications of the ACM, Vol. 40, No. 1, January 1997. Carey Nachenberg, “Computer Virus-Coevolution”, Communications of the ACM, Vol. 40, No. 1, January 1997.
19.
Zurück zum Zitat Evgenios Konstantinou, Stefen Wolthusen, “Metamorphic Virus: Analysis and Detection”, University of London, TechTarget, 2008. Evgenios Konstantinou, Stefen Wolthusen, “Metamorphic Virus: Analysis and Detection”, University of London, TechTarget, 2008.
20.
Zurück zum Zitat Sam Rash, Dan Gusfield, “String Barcoding – Uncovering Optimal Virus Signatures”, University of California, Davis, 2002. Sam Rash, Dan Gusfield, “String Barcoding – Uncovering Optimal Virus Signatures”, University of California, Davis, 2002.
21.
Zurück zum Zitat Stephanie Crawford, “How a Cloud Antivirus Works”, Computer HowStuffWorks, 2013. Stephanie Crawford, “How a Cloud Antivirus Works”, Computer HowStuffWorks, 2013.
Metadaten
Titel
A New Methodology Based on Cloud Computing for Efficient Virus Detection
verfasst von
Vasileios A. Memos
Kostas E. Psannis
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-06764-3_6

Neuer Inhalt