2014 IEEE 5th Control and System Graduate Research Colloquium 2014
DOI: 10.1109/icsgrc.2014.6908732
|View full text |Cite
|
Sign up to set email alerts
|

Detecting worm attacks in cloud computing environment: Proof of concept

Abstract: Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 4 publications
0
12
0
Order By: Relevance
“…Worm. A worm is a malicious program that can disrupt systems and applications by morphing their primary codes, causing those systems and applications to disintegrate and become unusable [2], [7]. It can multiply, infect, and spread without being attached to a host [8].…”
Section: Types Of Malwaresmentioning
confidence: 99%
See 4 more Smart Citations
“…Worm. A worm is a malicious program that can disrupt systems and applications by morphing their primary codes, causing those systems and applications to disintegrate and become unusable [2], [7]. It can multiply, infect, and spread without being attached to a host [8].…”
Section: Types Of Malwaresmentioning
confidence: 99%
“…As a result, it may occasionally fail to analyze unknown malware signatures that are not in its database. Static analysis is usually based on signatures, which must be updated on a regular basis and requires human expertise to produce new signatures [2], [7]. Due to the above reasons, it is not used in this research.…”
Section: Static Analysismentioning
confidence: 99%
See 3 more Smart Citations