2021
DOI: 10.1109/access.2021.3087316
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent Behavior-Based Malware Detection System on Cloud Computing Environment

Abstract: These days, cloud computing is one of the most promising technologies to store information and provide services online efficiently. Using this rapidly developing technology to protect computer-based systems from cyber-related attacks can bring many advantages over traditional protection schemes. The protected assets can be any computer-based systems such as cyber-physical systems (CPS), critical systems, desktop and laptop computers, mobile devices, and Internet of Things (IoT). Malicious software (malware) is… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
19
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(19 citation statements)
references
References 33 publications
0
19
0
Order By: Relevance
“…disease should not get undetected. In order to protect the devices, security models are discussed in several research [19]- [23].…”
Section: A Anomaly Detection Models For Rpmmentioning
confidence: 99%
“…disease should not get undetected. In order to protect the devices, security models are discussed in several research [19]- [23].…”
Section: A Anomaly Detection Models For Rpmmentioning
confidence: 99%
“…It is a kind of specific energy efficiency analysis, which is a more reasonable evaluation index for specific energy efficiency analysis. A reasonable definition of the conversion efficiency based on CC is conducive to comparing the technical development level of various technologies, which is more reasonable than the traditional thermal efficiency analysis method, and can accurately analyze the weak links of certain types of equipment [17][18].…”
Section: Ece Analysis Theory Based On CC Environmentmentioning
confidence: 99%
“…Owing to auto-scaling, assigning more resources to this server is commenced by the cloud manager [6]. If the attack is unidentified and unmitigated, the resource allocation process continues making a huge loss [7]. Moreover, the running of numerous Virtual Machines (VMs) occurs on a single physical server.…”
Section: Introductionmentioning
confidence: 99%