Malware Detection and Prevention on Cloud
Citation
MLA Style:Pawan Jaybhaye, Dr. Bandu B. Meshram "Malware Detection and Prevention on Cloud" International Journal of Computer and Organization Trends 9.4 (2019): 5-10.
APA Style:Pawan Jaybhaye, Dr. Bandu B. Meshram (2019). Malware Detection and Prevention on Cloud. International Journal of Computer and Organization Trends, 9(4), 5-10.
Abstract
Security on cloud is one of the concerns of this growing technology in today’s internet world. More and more organizations, enterprises and institutions are moving towards cloud technology because of affordable, efficient, and computing on demand like features. In recent years malware has became one of the most dangerous threat to the cloud service providers and their users and that threat is growing day by day. In this paper we propose a malware detection and prevention system on cloud based on signatures md5, sha1 etc and patterns of various families of existing malware. In this paper we will use cloud services for deployment of cloud based antivirus and hash signatures and patterns will be used in intrusion detection system. We also propose a system for real time analysis on cloud for malware detection and prevention.
References
[1] M. R. Watson, N. Shirazi, A. K. Marnerides, A. Mauthe and D. Hutchison, "Malware Detection in Cloud Computing Infrastructures," in IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp. 192-205, 1 March-April 2016.
[2] S. Das, Y. Liu, W. Zhang and M. Chandramohan, "Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 2, pp. 289-302, Feb. 2016
[3] L. J. Garcia Villalba, A. L. Sandoval Orozco and J. Maestre Vidal, "Malware Detection System by Payload Analysis of Network Traffic," in IEEE Latin America Transactions, vol. 13, no. 3, pp. 850-855, March 2015.
[4] Fischer A. et al. (2015) CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. In: Debruyne C. et al. (eds) On the Move to Meaningful Internet Systems: OTM 2015 Conferences. OTM 2015. Lecture Notes in Computer Science, vol 9415. Springer, Cham
[5] K. R. Choo, O. F. Rana and M. Rajarajan, "Cloud Security Engineering: Theory, Practice and Future Research," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 372-374, 1 July-Sept. 2017.
[6] N. Paladi, C. Gehrmann and A. Michalas, "Providing User Security Guarantees in Public Infrastructure Clouds," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 405-419, 1 July-Sept. 2017.
[7] Fischer A. et al. (2015) CloudIDEA: A Malware Defense Architecture for Cloud Data Centers. In: Debruyne C. et al. (eds) On the Move to Meaningful Internet Systems: OTM 2015 Conferences. OTM 2015. Lecture Notes in Computer Science, vol 9415. Springer, Cham
[8] S. Lins, S. Schneider and A. Sunyaev, "Trust is Good, Control is Better: Creating Secure Clouds by Continuous Auditing," in IEEE Transactions on Cloud Computing, vol. 6, no. 3, pp. 890-903, 1 July-Sept. 2018.
[9] W. Sha, Y. Zhu, M. Chen and T. Huang, "Statistical Learning for Anomaly Detection in Cloud Server Systems: A Multi-Order Markov Chain Framework," in IEEE Transactions on Cloud Computing, vol. 6, no. 2, pp. 401-413, 1 April-June 2018.
[10] K. R. Choo, O. F. Rana and M. Rajarajan, "Cloud Security Engineering: Theory, Practice and Future Research," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 372-374, 1 July-Sept. 2017.
[11] N. Paladi, C. Gehrmann and A. Michalas, "Providing User Security Guarantees in Public Infrastructure Clouds," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 405-419, 1 July-Sept. 2017.
[12] P. D. Ezhilchelvan and I. Mitrani, "Evaluating the Probability of Malicious Co-Residency in Public Clouds," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 420-427, 1 July-Sept. 2017.
[13] D. Gonzales, J. M. Kaplan, E. Saltzman, Z. Winkelman and D. Woods, "Cloud-Trust—a Security Assessment Model for Infrastructure as a Service (IaaS) Clouds," in IEEE Transactions on Cloud Computing, vol. 5, no. 3, pp. 523-536, 1 July-Sept. 2017
[14] Y. Lin, C. Lee, Y. Wu, P. Ho, F. Wang and Y. Tsai, "Active versus Passive Malware Collection," in Computer, vol. 47, no. 4, pp. 59-65, Apr. 2014.
[15] G. Zhao, K. Xu, L. Xu and B. Wu, "Detecting APT Malware Infections Based on Malicious DNS and Traffic Analysis," in IEEE Access, vol. 3, pp. 1132-1142, 2015. doi: 10.1109/ACCESS.2015.2458581
[16] T. Y. Win, H. Tianfield and Q. Mair, "Big Data Based Security Analytics for Protecting Virtualized Infrastructures in Cloud Computing," in IEEE Transactions on Big Data, vol. 4, no. 1, pp. 11-25, 1 March 2018.
[17] A. Mahboubi, S. Camtepe and H. Morarji, "A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts," in IEEE Access, vol. 5, pp. 27740-27756, 2017.
[18] Ammar Ahmed E. Elhadi, Mohd Aizaini Maarof and Ahmed Hamza Osman “Malware Detection Based on Hybrid Signature Behaviour Application Programming Interface Call Graph” in American Journal of Applied Sciences 9 (3): 283-288, 2012 ISSN 1546-9239
[19] Chirag Modi, Dhiren Patel, Bhavesh Borisaniya, Hiren Patel, Avi Patel, Muttukrishnan Rajarajan, “A survey of intrusion detection techniques in Cloud” in Journal of Network and Computer Applications, 2012
Keywords
Cloud, Malware, Hash, Real Time Analysis, Signatures, MD5, SHA1.