A zero-day resistant malware detection method for securing Cloud using SVM and Sandboxing Techniques

被引:0
作者
Kumar, Saket [1 ]
Singh, Chandra Bhim Bhan [1 ]
机构
[1] Natl Inst Technol Kurukshetra, Dept Comp Engn, Kurukshetra, Haryana, India
来源
PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT) | 2018年
关键词
Cloud Computing; Machine Learning; SVM; n-class SVM; Zero-day resistance;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud now a day has become the backbone of the IT infrastructure. Whole of the infrastructure is now being shifted to the clouds, and as the cloud involves all of the networking schemes and the OS images, it inherits all of the vulnerabilities too. And hence securing them is one of our very prior concerns. Malwares are one of the many other problems that have ever growing and hence need to be eradicated from the system. The history of malwares go long back in time since the advent of computers and hence a lot of techniques has also been already devised to tackle with the problem in some or other way. But most of them fall short in some or other way or are just too heavy to execute on a simple user machine. Our approach devises a 3 - phase exhaustive technique which confirms the detection of any kind of malwares from the host. It also works for the zero-day attacks that are really difficult to cover most times and can be of really high-risk at times. We have thought of a solution to keep the things light weight for the user.
引用
收藏
页码:1397 / 1402
页数:6
相关论文
共 15 条
  • [1] [Anonymous], 1992, MD5 MESSAGE DIGEST A
  • [2] Hiding virtualization from attackers and malware
    Carpenter, Matthew
    Liston, Tom
    Skoudis, Ed
    [J]. IEEE SECURITY & PRIVACY, 2007, 5 (03) : 62 - 65
  • [3] Chaney MichaelA., 2018, Where Is All My Relation?: The Poetics of Dave the Potter, P1
  • [4] Christodorescu Mihai, 2003, USENIX SEC S
  • [5] Damshenas M., 2013, INT J CYBER SECURITY, V2, P10
  • [6] Daryabar F., 2012, CYB SEC CYB WARF DIG, P6064
  • [7] Huang H. - D., 2011, INT AG IA 2011 IEEE, P18
  • [8] Nataraj L., 2011, P 8 INT S VIS CYB SE, P1, DOI DOI 10.1145/2016904.2016908
  • [9] Nataraj L, 2011, P 4 ACM WORKSH SEC A, P21, DOI [10.1145/2046684.2046689, DOI 10.1145/2046684.2046689]
  • [10] RFID malware: Design principles and examples
    Rieback, Melanie R.
    Simpson, Patrick N. D.
    Crispo, Bruno
    Tanenbaum, Andrew S.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2006, 2 (04) : 405 - 426