Research on Computer Network Virus Defense Technology in Cloud Technology Environment

被引:0
|
作者
Zhao Sheng [1 ]
Han HuiShan [1 ]
Shi XueKui [1 ]
机构
[1] Xingtai Polytech Coll, Xingtai, Hebei, Peoples R China
关键词
cloud computing; virus malware analysis; behavior based detection; central gravity optimization algorithm;
D O I
10.14257/ijsia.2016.10.3.39
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the Internet, the antivirus software of the network is always emerging and constantly changing. Traditional detection methods can't effectively kill the new viruses and malicious software, the complexity of which also makes itself easy to be attacked by malicious software. The emergence of cloud computing has changed the status quo. Therefore, the architecture model of virus malware detection based on cloud computing is proposed in this paper. Based on the combination of the method for detecting malicious software virus based on cloud computing and the algorithm analysis theory in machine learning, a new type of distributed CFO algorithm is proposed, and the closed environment of cloud computing virtual machine nodes is used to realize dynamic behavior monitoring to the virus malware, then the distributed fluctuations PIF algorithm is used to describe the process of dynamic analysis and analysis reporting, besides, the wave algorithm is carried out corresponding improvement based on the analysis of the environment. Experimental results show that the model can detect the conditional trigger behavior of virus malware, so as to find the conditions for triggering malicious behavior and the input data that satisfy these conditions and the performance of this monitoring system is greatly improved compared with the common single machine system.
引用
收藏
页码:449 / 460
页数:12
相关论文
共 50 条
  • [1] Computer network security and defense technology research
    Wang Qing
    Chen Hongju
    [J]. PROCEEDINGS 2016 EIGHTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION ICMTMA 2016, 2016, : 155 - 157
  • [2] Research on Applied Technology for Computer Network Security Under Cloud Computing Environment
    Xu, Haili
    [J]. 4TH INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING FOR ADVANCED TECHNOLOGIES (ICMEAT 2015), 2015, : 529 - 532
  • [3] Research on the design of computer network security defense system applying cloud computing technology
    Wang J.
    [J]. Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [4] Research on Computer Network Security Vulnerabilities and Encryption Technology in Cloud Computing Environment
    Peng P.
    [J]. Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [5] Research on the Application of Computer Cloud Technology in Network Teaching
    Wang, Rui
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INNOVATIONS IN ECONOMIC MANAGEMENT AND SOCIAL SCIENCE (IEMSS 2017), 2017, 29 : 1621 - 1625
  • [6] Analysis on the Application of Data Mining Technology in Computer Network Virus Defense
    Sun, Hujun
    [J]. 3RD INTERNATIONAL CONFERENCE ON SOCIAL SCIENCE, MANAGEMENT AND ECONOMICS (SSME 2017), 2017, : 417 - 421
  • [7] Research on Computer Processing Technology of Big Data Based on Cloud Environment
    Du, Chenglong
    [J]. 2022 INTERNATIONAL CONFERENCE ON INDUSTRIAL IOT, BIG DATA AND SUPPLY CHAIN, IIOTBDSC, 2022, : 159 - 162
  • [8] Study on active defense technology and detection algorithm of virus based on computer network
    Tianjin Urban Construction Managerment Vocational Technology College, China
    [J]. Int. J. Hybrid Inf. Technol., 7 (435-442):
  • [9] Computer Network Security and Technology Research
    Fan Yan
    Yang Jian-wen
    Cheng Lin
    [J]. 2015 SEVENTH INTERNATIONAL CONFERENCE ON MEASURING TECHNOLOGY AND MECHATRONICS AUTOMATION (ICMTMA 2015), 2015, : 293 - 296
  • [10] Research of Computer Network Security Technology
    Tan, Juan
    [J]. PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL, 2015, 125 : 736 - 740