Open Access   Article Go Back

Malware Detection In Cloud Computing

Aswin Sadanandan1 , T .Poovarasan2 , V. Kavitha3 , N. Reavthy4

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-11 , Page no. 237-241, Nov-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i11.237241

Online published on Nov 30, 2018

Copyright © Aswin Sadanandan, T .Poovarasan, V. Kavitha, N. Reavthy . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Aswin Sadanandan, T .Poovarasan, V. Kavitha, N. Reavthy, “Malware Detection In Cloud Computing,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.11, pp.237-241, 2018.

MLA Style Citation: Aswin Sadanandan, T .Poovarasan, V. Kavitha, N. Reavthy "Malware Detection In Cloud Computing." International Journal of Computer Sciences and Engineering 6.11 (2018): 237-241.

APA Style Citation: Aswin Sadanandan, T .Poovarasan, V. Kavitha, N. Reavthy, (2018). Malware Detection In Cloud Computing. International Journal of Computer Sciences and Engineering, 6(11), 237-241.

BibTex Style Citation:
@article{Sadanandan_2018,
author = {Aswin Sadanandan, T .Poovarasan, V. Kavitha, N. Reavthy},
title = {Malware Detection In Cloud Computing},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {11 2018},
volume = {6},
Issue = {11},
month = {11},
year = {2018},
issn = {2347-2693},
pages = {237-241},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3150},
doi = {https://doi.org/10.26438/ijcse/v6i11.237241}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i11.237241}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3150
TI - Malware Detection In Cloud Computing
T2 - International Journal of Computer Sciences and Engineering
AU - Aswin Sadanandan, T .Poovarasan, V. Kavitha, N. Reavthy
PY - 2018
DA - 2018/11/30
PB - IJCSE, Indore, INDIA
SP - 237-241
IS - 11
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
632 392 downloads 251 downloads
  
  
           

Abstract

In recent years the usage of cloud computing were emerged in big aspects. Hence the security of this big systems were in danger due to the intrusion and stealing of personal data. Inspite there are many primitive measures and antivirus tools were used in the cloud but they are not much effective in nature of modern malwares. Inorder to withstand or recover quickly from difficult conditions the cloud has to react towards not only to the known threats, but also to prevent against the new objection. This paper includes in about an approach in detection of malwares in cloud infrastructure. This approach provides greater efficiency in detection of malwares enhanced forensics capabilities and improved deployability. In this paper we join together detection techniques, Behavioral Blocking and Heuristic Analysis or Pro-Active Defense. Using this mechanism we find that cloud-malware detection provides better detection against recent threats compared to a single antivirus engine and a 98% detection rate across the cloud environment.

Key-Words / Index Term

Cloud computing,threats,antivirus,security,deployability,resilience,malware

References

[1] Bo Li, Eul Gyu I`m “ A signature matching optimization policy for antivirus programs” Electronics and Computer Engineering, Hanyang University, Seoul, Korea. © IEEE 2011
[2] S. Subashini, V. Kavitha s.l “A survey of security issues in service delivery models of cloud computing.” .Science Direct, Journal of Network and Computer Applications, pp. (1-11) January (2011)
[3] Scott Treadwell, Mian Zhou “A Heuristic Approach for Detection of Obfuscated Malware”, Bank of America, 1201 Main St, Dallas, TX 75202, © IEEE 2009.
[4] Lajos Nagy, Richard Ford, and William Allen, “N-version programming for the detection of zero-day exploits”, In IEEE Topical Conference on Cybersecurity, Daytona Beach, Florida, USA, 2006.
[5] A. Ibrahim, J. Hamlyn-Harris, J. Grundy, and M. Almorsy, “Cloudsec: A security monitoring appliance for virtual machines in the iaas cloud model,” in Network and System Security (NSS), 2011 5th International Conference on, Sept 2011, pp. 113–120.
[6] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys (CSUR), vol. 41, no. 3, p. 15, 2009.
[7] A. K. Marnerides, M. R. Watson, N. Shirazi, A. Mauthe, and D. Hutchison, “Malware analysis in cloud computing: Network and system characteristics,” IEEE Globecom 2013, 2013.
[8] C. Wang, V. Talwar, K. Schwan, and P. Ranganathan, “Online detection of utility cloud anomalies using metric distributions,” in Network Operations and Management Symposium (NOMS), 2010 IEEE. IEEE, 2010, pp. 96–103.
[9] S.K. Sharma, L. Gupta, “A Novel Approach for Cloud Computing Environment”, International Journal of Computer Sciences and Engineering, Vol. 4, Issue.12, pp.1-5, 2014.
[10] S.L. Mewada, C. Srivastava, “A Novel Approach for Cloud Environment”, International Journal of Computer Sciences and Engineering, Vol. 4, No.10, pp.1-15, 2010.