Skip to main content

2017 | OriginalPaper | Buchkapitel

Cloud Based Malware Detection Technique

verfasst von : Sagar Shaw, Manish Kumar Gupta, Sanjay Chakraborty

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Security is one of the major concerns in cloud computing now-a-days. Malicious code deployment is the main cause of threat in today’s cloud paradigm. Antivirus software unable to detect many modern malware threats which causes serious impacts in basic cloud operations. This paper counsels a new model for malware detection on cloud architecture. This model enables identification of malicious and unwanted software by amalgamation of multiple detection engines. This paper follows DNA sequence detection process, symbolic detection process, and behavioural detection process to detect various threats. The proposed approach (PMDM) can be deployed on a VMM which remains fully transparent to guest VM and to cloud users. However, PMDM prevents the malicious code running in one VM (infected VM) to spread into another noninfected VM with help of hosted VMM. After detecting malicious code by PMDM technique, it warns the other guest VMs about it. In this paper, a prototype of PMDM is partially implemented on one popular open-source cloud architecture—Eucalyptus.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Marinescu D.C., “Cloud Computing: Theory and Practice”, MK Publication (2013). Marinescu D.C., “Cloud Computing: Theory and Practice”, MK Publication (2013).
2.
Zurück zum Zitat Dahl G.E., Stokes J.W. et al., “Large-scale malware classification using random projections and neural networks”, IEEE International Conference Dahl G.E., Stokes J.W. et al., “Large-scale malware classification using random projections and neural networks”, IEEE International Conference
3.
Zurück zum Zitat Hatem S.S., wafy M.H., et al., “Malware Detection in Cloud Computing”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol 5, Science and Information (2014). Hatem S.S., wafy M.H., et al., “Malware Detection in Cloud Computing”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol 5, Science and Information (2014).
4.
Zurück zum Zitat Graham M., “Behaviour of Botnets and Other Malware in Virtual Environments”, The Open Web Application Security Project (2014). Graham M., “Behaviour of Botnets and Other Malware in Virtual Environments”, The Open Web Application Security Project (2014).
5.
Zurück zum Zitat Oberheide J., Cooke E. et al., “CloudAV: N-Version Antivirus in the Network Cloud”, 17th conference on Security symposium, pp- 91–106 (2008). Oberheide J., Cooke E. et al., “CloudAV: N-Version Antivirus in the Network Cloud”, 17th conference on Security symposium, pp- 91–106 (2008).
6.
Zurück zum Zitat Pedersen j., Bastola D., et al., “BLAST Your Way through Malware Malware Analysis Assisted by Bioinformatics Tools”, International Conference on Security and Management (2012). Pedersen j., Bastola D., et al., “BLAST Your Way through Malware Malware Analysis Assisted by Bioinformatics Tools”, International Conference on Security and Management (2012).
7.
Zurück zum Zitat Mandl T., Bayer U.et al., “ANUBIS ANalyzing Unknown BInarieS The automatic Way”, VIRUS Bulletin Conference, v 1.0.02 (2009). Mandl T., Bayer U.et al., “ANUBIS ANalyzing Unknown BInarieS The automatic Way”, VIRUS Bulletin Conference, v 1.0.02 (2009).
8.
Zurück zum Zitat Johnson D, Murari K. et al., “Eucalyptus Beginner’s Guide- UEC Edition”, v1.0 (2010). Johnson D, Murari K. et al., “Eucalyptus Beginner’s Guide- UEC Edition”, v1.0 (2010).
9.
Zurück zum Zitat Parmar H., Champaneria T., “Comparative Study of Open Nebula, Eucalyptus, Open Stack and Cloud Stack”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No. 2, pp 714–721 (2014). Parmar H., Champaneria T., “Comparative Study of Open Nebula, Eucalyptus, Open Stack and Cloud Stack”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No. 2, pp 714–721 (2014).
Metadaten
Titel
Cloud Based Malware Detection Technique
verfasst von
Sagar Shaw
Manish Kumar Gupta
Sanjay Chakraborty
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_48

Premium Partner