Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 515))

Abstract

Security is one of the major concerns in cloud computing now-a-days. Malicious code deployment is the main cause of threat in today’s cloud paradigm. Antivirus software unable to detect many modern malware threats which causes serious impacts in basic cloud operations. This paper counsels a new model for malware detection on cloud architecture. This model enables identification of malicious and unwanted software by amalgamation of multiple detection engines. This paper follows DNA sequence detection process, symbolic detection process, and behavioural detection process to detect various threats. The proposed approach (PMDM) can be deployed on a VMM which remains fully transparent to guest VM and to cloud users. However, PMDM prevents the malicious code running in one VM (infected VM) to spread into another noninfected VM with help of hosted VMM. After detecting malicious code by PMDM technique, it warns the other guest VMs about it. In this paper, a prototype of PMDM is partially implemented on one popular open-source cloud architecture—Eucalyptus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Marinescu D.C., “Cloud Computing: Theory and Practice”, MK Publication (2013).

    Google Scholar 

  2. Dahl G.E., Stokes J.W. et al., “Large-scale malware classification using random projections and neural networks”, IEEE International Conference

    Google Scholar 

  3. Hatem S.S., wafy M.H., et al., “Malware Detection in Cloud Computing”, International Journal of Advanced Computer Science and Applications (IJACSA), Vol 5, Science and Information (2014).

    Google Scholar 

  4. Graham M., “Behaviour of Botnets and Other Malware in Virtual Environments”, The Open Web Application Security Project (2014).

    Google Scholar 

  5. Oberheide J., Cooke E. et al., “CloudAV: N-Version Antivirus in the Network Cloud”, 17th conference on Security symposium, pp- 91–106 (2008).

    Google Scholar 

  6. Pedersen j., Bastola D., et al., “BLAST Your Way through Malware Malware Analysis Assisted by Bioinformatics Tools”, International Conference on Security and Management (2012).

    Google Scholar 

  7. Mandl T., Bayer U.et al., “ANUBIS ANalyzing Unknown BInarieS The automatic Way”, VIRUS Bulletin Conference, v 1.0.02 (2009).

    Google Scholar 

  8. Johnson D, Murari K. et al., “Eucalyptus Beginner’s Guide- UEC Edition”, v1.0 (2010).

    Google Scholar 

  9. Parmar H., Champaneria T., “Comparative Study of Open Nebula, Eucalyptus, Open Stack and Cloud Stack”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.4, No. 2, pp 714–721 (2014).

    Google Scholar 

  10. https://www.youtube.com/watch?v=fV5kED7nryw.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sagar Shaw .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Shaw, S., Gupta, M.K., Chakraborty, S. (2017). Cloud Based Malware Detection Technique. In: Satapathy, S., Bhateja, V., Udgata, S., Pattnaik, P. (eds) Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications . Advances in Intelligent Systems and Computing, vol 515. Springer, Singapore. https://doi.org/10.1007/978-981-10-3153-3_48

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3153-3_48

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3152-6

  • Online ISBN: 978-981-10-3153-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics