Malware Detection in Iaas Cloud Computing Using Time Based Detection Mechanisms

被引:1
|
作者
Dhaya, C. [1 ]
Abirami, N. [1 ]
机构
[1] Adhiparasakthi Engn Coll, Dept Comp Sci & Engn, Melmaruvathur, India
关键词
ddos attacks; sipdas attacks; Hackers;
D O I
10.1109/ICTACC.2017.15
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter. OpenStack lets users deploy virtual machines and other instances which handle different tasks for managing a cloud environment. A cloud usually possesses profound resources, and has full control and dynamic allocation capability of its resources. Cloud offers us the potential to overcome DDoS attacks. Individual cloud hosted servers are still vulnerable to DDoS attacks if they still run in the traditional way. Stealthy attack as one that is remains undetected by the client computer. A strategy to orchestrate stealthy attack patterns, which exhibit a slowly-increasing-intensity trend designed to inflict the maximum financial cost to the cloud customer, while respecting the job size and service arrival rate imposed by the detection mechanisms.
引用
收藏
页码:16 / 17
页数:2
相关论文
共 50 条
  • [1] Malware Detection in Cloud Computing
    Hatem, Safaa Salam
    Wafy, Maged H.
    El-Khouly, Mahmoud M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (04) : 187 - 192
  • [2] An Android Malware Detection System Based on Cloud Computing
    Cui, Shujuan
    Sun, Gengxin
    Bin, Sheng
    Zhou, Xicheng
    [J]. 3RD INTERNATIONAL CONFERENCE ON APPLIED ENGINEERING, 2016, 51 : 691 - 696
  • [3] Malware Detection in Cloud Computing Infrastructures
    Watson, Michael R.
    Shirazi, Noor-ul-Hassan
    Marnerides, Angelos K.
    Mauthe, Andreas
    Hutchison, David
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2016, 13 (02) : 192 - 205
  • [4] Malware Detection in Cloud Computing using an Image Visualization Technique
    Abdullayeva, Fargana
    [J]. 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT 2019), 2019, : 201 - 205
  • [5] Towards Abuse Detection and Prevention in IaaS Cloud Computing
    Lindemann, Jens
    [J]. PROCEEDINGS 10TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY ARES 2015, 2015, : 211 - 217
  • [6] Toward Anomaly Detection in IaaS Cloud Computing Platforms
    Lin, Mingwei
    Yao, Zhiqiang
    Gao, Fei
    Li, Yang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (12): : 175 - 188
  • [7] Effective analysis of malware detection in cloud computing
    Yadav, Ram Mahesh
    [J]. COMPUTERS & SECURITY, 2019, 83 : 14 - 21
  • [8] Intrusion Detection in Cloud Computing Implementation of (SAAS & IAAS) Using Grid Environment
    Moorthy, S. Manthira
    Masillamani, M. Roberts
    [J]. PROCEEDINGS OF INTERNATIONAL CONFERENCE ON INTERNET COMPUTING AND INFORMATION COMMUNICATIONS (ICICIC GLOBAL 2012), 2014, 216 : 53 - 64
  • [9] Analysis of Detection and Prevention of Malware in Cloud Computing Environment
    Bedi, Anav
    Pandey, Nitin
    Khatri, Sunil Kumar
    [J]. PROCEEDINGS 2019 AMITY INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE (AICAI), 2019, : 918 - 921
  • [10] Cloud Based Malware Detection Technique
    Shaw, Sagar
    Gupta, Manish Kumar
    Chakraborty, Sanjay
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON FRONTIERS IN INTELLIGENT COMPUTING: THEORY AND APPLICATIONS, FICTA 2016, VOL 1, 2017, 515 : 485 - 495