2012 IEEE 16th International Enterprise Distributed Object Computing Conference 2012
DOI: 10.1109/edoc.2012.27
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Detecting Malware in Cloud by Identifying Symptoms

Abstract: Abstract-Security is seen as one of the major challenges of the Cloud computing. Recent malware are not only becoming more sophisticated, but has also demonstrated a trend to make use of components, which can easily be distributed through the Internet to develop newer and better malware. As a result, the key problem facing Cloud security is to cope with identifying diverse set of malwares. This paper presents a method of detecting malware by identifying the symptoms of malicious behaviour as opposed to looking… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
6
1
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 30 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…For that, the analysis based on the type of attack is necessary i.e, for each type of attack we have to follow a particular set of steps to mitigate the probability of execution in the client machine. [23][24] [25][26] a. SYN ood attack SYN ood attacks can be prevented only by certain rewall ltering policies. Most of the SYN attacks ltering is an easy process since they will have the TCP header parameters which is common.…”
Section: Mitigation Of Ddos Attackmentioning
confidence: 99%
“…For that, the analysis based on the type of attack is necessary i.e, for each type of attack we have to follow a particular set of steps to mitigate the probability of execution in the client machine. [23][24] [25][26] a. SYN ood attack SYN ood attacks can be prevented only by certain rewall ltering policies. Most of the SYN attacks ltering is an easy process since they will have the TCP header parameters which is common.…”
Section: Mitigation Of Ddos Attackmentioning
confidence: 99%
“…FVMs are typically autonomous simplified VMs with limited computability and communication. This concept was more formally defined in the context of Cloud security in [16,17], where a mobility algorithm was defined for the general purpose of searching for symptoms and discovering their dangerous configurations. The mobility algorithm has become an important tool for cloud monitoring providing light way security, though it is difficult to analyze due to its complexity including security aspects.…”
Section: Previous Workmentioning
confidence: 99%
“…Researchers are providing new techniques to counter the malware attacks [1], [2], [3], [4]; the more sophisticated malicious code is getting by using polymorphism (different encryptions of the same binary), metamorphism (different code for the same functionality), rootkit technology (enable administrator-level access) etc.…”
Section: Related Workmentioning
confidence: 99%