Skip to main content

2017 | OriginalPaper | Buchkapitel

Implementing Anti-Malware as Security-as-a-Service from Cloud

verfasst von : Deepak H. Sharma, C. A. Dhote, Manish M. Potey

Erschienen in: Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In Security-as-a-service model the objective is to provide security as one of the cloud services. In this model the security is provided from the cloud in place of traditional on-premise implementation. The objective of this initiative is to provide Anti-Malware functionality as a cloud service. This paper provides implementation framework for Anti-Malware system from the cloud as a service. The framework uses several existing file scanning web-based anti-malware engines. The Anti-Malware SecaaS offers all the benefits provided by Security-as-a-Service (SecaaS) model. The proof-of-concept (POC) prototype of Anti-Malware AM-SecaaS is implemented and evaluated successfully. An innovative approach is used to integrate this POC with other SecaaS options so that various SecaaS options are provided to users intelligently and transparently.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Chris Jarabek, David Barrera, and John Aycock. 2012. ThinAV: truly lightweight mobile cloud-based anti-malware. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC ‘12). ACM, New York, NY, USA, 209–218. Chris Jarabek, David Barrera, and John Aycock. 2012. ThinAV: truly lightweight mobile cloud-based anti-malware. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC ‘12). ACM, New York, NY, USA, 209–218.
2.
Zurück zum Zitat J. Xu, J. Yan, L. He, P. Su and D. Feng, “CloudSEC: A Cloud Architecture for Composing Collaborative Security Services,” Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, Indianapolis, IN, 2010, pp. 703–711. J. Xu, J. Yan, L. He, P. Su and D. Feng, “CloudSEC: A Cloud Architecture for Composing Collaborative Security Services,” Cloud Computing Technology and Science (CloudCom), 2010 IEEE Second International Conference on, Indianapolis, IN, 2010, pp. 703–711.
3.
Zurück zum Zitat W. Yan, “CAS: A framework of online detecting advance malware families for cloud-based security,” 2012 1st IEEE International Conference on Communications in China (ICCC), Beijing, 2012, pp. 220–225. W. Yan, “CAS: A framework of online detecting advance malware families for cloud-based security,” 2012 1st IEEE International Conference on Communications in China (ICCC), Beijing, 2012, pp. 220–225.
4.
Zurück zum Zitat Mohammed Hussain and Hanady Abdulsalam. 2011. SECaaS: security as a service for cloud-based applications. In Proceedings of the Second Kuwait Conference on e-Services and e-Systems(KCESS ‘11). ACM, New York, NY, USA,, Article 8, 4 pages. Mohammed Hussain and Hanady Abdulsalam. 2011. SECaaS: security as a service for cloud-based applications. In Proceedings of the Second Kuwait Conference on e-Services and e-Systems(KCESS ‘11). ACM, New York, NY, USA,, Article 8, 4 pages.
5.
Zurück zum Zitat Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egemen Tas, Umesh Gupta, and Melih Abdulhayoglu. 2011. Combining file content and file relations for cloud based malware detection. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD ‘11). ACM, New York, NY, USA, 222–230. Yanfang Ye, Tao Li, Shenghuo Zhu, Weiwei Zhuang, Egemen Tas, Umesh Gupta, and Melih Abdulhayoglu. 2011. Combining file content and file relations for cloud based malware detection. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD ‘11). ACM, New York, NY, USA, 222–230.
6.
Zurück zum Zitat Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O’Reilly Media, 336. Tim Mather, Subra Kumaraswamy, and Shahed Latif, 2009, Cloud Security and Privacy. An Enterprise Perspective on Risks and Compliance, O’Reilly Media, 336.
7.
Zurück zum Zitat Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010. Websense white paper, Seven Criteria for Evaluating Security-as-a- Service Solutions, 2010.
8.
Zurück zum Zitat Deepak Sharma, Dr. C A. Dhote, Manish Potey, ‘Security-as-a-Service from Clouds: A comprehensive Analysis’, IJCA Volume 67-Number 3, April 2013. Deepak Sharma, Dr. C A. Dhote, Manish Potey, ‘Security-as-a-Service from Clouds: A comprehensive Analysis’, IJCA Volume 67-Number 3, April 2013.
9.
Zurück zum Zitat Deepak Sharma, Dr. C A. Dhote, Manish Potey, ‘Security-as-a-Service from Clouds : A survey’ IIJC Vol 1 Issue 4, October 2011. Deepak Sharma, Dr. C A. Dhote, Manish Potey, ‘Security-as-a-Service from Clouds : A survey’ IIJC Vol 1 Issue 4, October 2011.
Metadaten
Titel
Implementing Anti-Malware as Security-as-a-Service from Cloud
verfasst von
Deepak H. Sharma
C. A. Dhote
Manish M. Potey
Copyright-Jahr
2017
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-3153-3_53

Premium Partner