Malware detection for multi cloud servers using intermediate monitoring server | IEEE Conference Publication | IEEE Xplore

Malware detection for multi cloud servers using intermediate monitoring server


Abstract:

Malware protection is more required for secured protection on cloud networks, it imposes a critical threat to network security. Due to very limited malware protection i.e...Show More

Abstract:

Malware protection is more required for secured protection on cloud networks, it imposes a critical threat to network security. Due to very limited malware protection i.e., only PC based protection is upto date. In this paper, it enhanced and designed an intermediate malware protection for malware propagates in cloud networks from a global perspective. Research provides various layered protection for formulating the problem, and establish a rigorous multi layer epidemic model for malware propagation from network to network. In this work the problem was formulated by establishing a rigorous two layered epidemic model for malware propagation from network to network. Designing Intermediate Malware Monitoring & removal for multi cloud servers. In Malware Monitoring, you get continuous monitoring of any potential issue by utilizing a scanning service that identifies all types of virus, malware which are spread through various websites. In our proposed system we design detection of malware for multi cloud servers using a intermediate monitoring server, any file transmission to multi clouds should be scanned by intermediate server, providing scanning, detection and removal of malware before transmitting to cloud servers.
Date of Conference: 01-02 August 2017
Date Added to IEEE Xplore: 21 June 2018
ISBN Information:
Conference Location: Chennai, India

I. Introduction

Malware are malicious software programs deployed by cyber attackers to compromise computer [1] systems by exploiting their security vulnerabilities. These are motivated by extraordinary financial or political rewards, malware owners are exhausting their energy to compromise as many networked computers as they can in order to achieve their malicious goals. Malware are malicious software programs deployed by cyber attackers to compromise on computers. These Malwares are being created at an alarming rate in order to gain political and financial rewards. These malwares are sent to infect the whole network and gain confidential information. The systems that are affected by these Malwares are called as bots. A malware programmer writes a program, known as bot or agent, and then installs the bots at compromised computer systems at the Internet the usage of various community virus-like techniques. All of his bots form a botnet, that is managed by using its proprietors to devote illegal responsibilities, which include launching DDoS assaults, sending junk mail emails, appearing phishing activities, and accumulating touchy statistics. There is a command and control (C&C) server(s) to talk with the bots and acquire records from bots. In order to cover himself from prison forces, the botmaster modifies the url of his command and control often, e.g., weekly. An outstanding explanation about this can be determined in [1].

Contact IEEE to Subscribe

References

References is not available for this document.