2015 International Conference on Computing, Networking and Communications (ICNC) 2015
DOI: 10.1109/iccnc.2015.7069320
|View full text |Cite
|
Sign up to set email alerts
|

Malware detection in the cloud under Ensemble Empirical Mode Decomposition

Abstract: Abstract-Cloud networks underpin most of todays' socioeconomical Information Communication Technology (ICT) environments due to their intrinsic capabilities such as elasticity and service transparency. Undoubtedly, this increased dependence of numerous always-on services with the cloud is also subject to a number of security threats. An emerging critical aspect is related with the adequate identification and detection of malware.In the majority of cases, malware is the first building block for larger security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…This is due to the fact that, in the majority of cases, malware is the first point of initiation for large-scale Distributed Denial of Service (DDoS) attacks, phishing and email spamming [3], [8], mainly through the deployment of botware.…”
Section: Malware and Detection Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…This is due to the fact that, in the majority of cases, malware is the first point of initiation for large-scale Distributed Denial of Service (DDoS) attacks, phishing and email spamming [3], [8], mainly through the deployment of botware.…”
Section: Malware and Detection Methodsmentioning
confidence: 99%
“…In [3], [8], [9] the specific security threats and challenges introduced into clouds through the use of core virtualisation technologies are discussed. Despite the end-user benefits gained by virtualisation it also comes with a range of threats that include: exploits to security holes on virtual machines (e.g.…”
Section: Virtualisation and Cloud Technologiesmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, security and resilience are playing important roles. A number of studies have addressed aspects of cloud security [16] [17] [18] at different levels such as network, hypervisor, guest VM and Operating System (OS).…”
Section: Malware's In Virtualized Environmentmentioning
confidence: 99%