A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques

被引:0
|
作者
Kumar, Saket [1 ]
Singh, Chandra Bhim Bhan [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
关键词
Cloud Computing; Machine Learning; SVM; n-class SVM; Zero-day resistance;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud now a day has become the backbone of the IT infrastructure. Whole of the infrastructure is now being shifted to the clouds, and as the cloud involves all of the networking schemes and the OS images, it inherits all of the vulnerabilities too. And hence securing them is one of our very prior concerns. Malwares are one of the many other problems that have ever growing and hence need to be eradicated from the system. The history of malwares go long back in time since the advent of computers and hence a lot of techniques has also been already devised to tackle with the problem in some or other way. But most of them fall short in some or other way or are just too heavy to execute on a simple user machine. Our approach devises a 3 - phase exhaustive technique which confirms the detection of any kind of malwares from the host. It also works for the zero-day attacks that are really difficult to cover most times and can be of really high-risk at times. We have thought of a solution to keep the things light weight for the user.
引用
收藏
页码:1397 / 1402
页数:6
相关论文
共 50 条
  • [31] Comparative Evaluation of AI-Based Techniques for Zero-Day Attacks Detection
    Ali, Shamshair
    Rehman, Saif Ur
    Imran, Azhar
    Adeem, Ghazif
    Iqbal, Zafar
    Kim, Ki-Il
    ELECTRONICS, 2022, 11 (23)
  • [32] Deep Neural Network and Transfer Learning for Accurate Hardware-Based Zero-Day Malware Detection
    He, Zhangying
    Rezaei, Amin
    Homayoun, Houman
    Sayadi, Hossein
    PROCEEDINGS OF THE 32ND GREAT LAKES SYMPOSIUM ON VLSI 2022, GLSVLSI 2022, 2022, : 27 - 32
  • [33] Detection of zero-day attacks in computer networks using combined classification
    Gavari Bami, Hamid
    Moharamkhani, Elaheh
    Zadmehr, Behrouz
    Najafpoor, Vahid
    Shokouhifar, Mohammad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (27):
  • [34] Toward Zero-day Attack Identification Using Linear Data Transformation Techniques
    AlEroud, Ahmed
    Karabatis, George
    2013 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY (SERE), 2013, : 159 - 168
  • [35] Anomaly Detection Based on CNN and Regularization Techniques Against Zero-Day Attacks in IoT Networks
    Hairab, Belal Ibrahim
    Elsayed, Mahmoud Said
    Jurcut, Anca D.
    Azer, Marianne A.
    IEEE ACCESS, 2022, 10 : 98427 - 98440
  • [36] Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning
    Cen M.
    Deng X.
    Jiang F.
    Doss R.
    Computers and Security, 2024, 142
  • [37] Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning
    Cen, Mingcan
    Deng, Xizhen
    Jiang, Frank
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 142
  • [38] Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning
    Cen, Mingcan
    Deng, Xizhen
    Jiang, Frank
    Doss, Robin
    COMPUTERS & SECURITY, 2024, 142
  • [39] Towards Detection of Zero-Day Botnet Attack in IoT Networks using Federated Learning
    Zhang, Jielun
    Liang, Shicong
    Ye, Feng
    Hu, Rose Qingyang
    Qian, Yi
    ICC 2023-IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2023, : 7 - 12
  • [40] Mecha: A Neural-Symbolic Open-Set Homogeneous Decision Fusion Approach for Zero-Day Malware Similarity Detection
    Molloy, Christopher
    Banks, Jeremy
    Ding, Steven H. H.
    Alaca, Furkan
    Charland, Philippe
    Walenstein, Andrew
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2025, 51 (02) : 621 - 637