Preventing System from Malware Effect in Cloud Computing Environment

Authors

  • Megha Rani Raigonda  Department of Computer Studies and Computer Applications, Visvesvaraya Technological University, Center for PG Studies, Kalaburagi, Karnataka, India
  • Shivasharanappa  Department of Computer Studies and Computer Applications, Visvesvaraya Technological University, Center for PG Studies, Kalaburagi, Karnataka, India

Keywords:

SaaS, Paas, Iaas, DoS, Cloud Service, CAIDA, VM, SVM, SOA, OOAD

Abstract

Cloud domain is important to provide a security for privacy, public and protected. Cloud Service, security can be provided to protect data and information. In Cloud service protect the data from intruders and send alert message to the users. In our traditional system, it can detect only virus. We exhibit that our plan can achieve a high identification precision of more than 90% identifying different sorts of malware and DoS assaults. Moreover, we assess the benefits of considering framework level information, as well as system level information depending upon the assault sort. In our proposed, we used an Amazon Cloud as a domain, in this service user can store the data and information provide the security. In our current system it not only detect the malware it can also protect from Hacker .If any unauthorized are accessing data it will protect from the intruders and send an alert message to the authorized person. In addition, it will be more effective than our traditional system. In a current study we have developed an application that protect from hacker and it will generate an secret key to provide to download the data from the Cloud. Finally which can be help full to protect data from intruders and it provide a security.

References

  1. A. Marnerides, C.James, A.Schaeffer, S.Sait, A.Mauthe, and H.Murthy, "Multi-level network resilience: Traffic analysis,anomaly detection and simulation,"ICTACT J. Commun. Technol.,Special Issue Next Generation Wireless Netw. Appl.,vol.02, pp. 0345-0356, June.02011.
  2. J.P.G.Sterbenz, D.Hutchison, E.K.C¸ etinkaya, A.Jabbar, J. P. Rohrer,M. Sch€oller, and P.Smith,"Resilience and survivabilityin communication networks: Strategies, principles, and survey of disciplines,"Comput.Netw.,vol.054,no.08,pp.01245- 01265, June.02010.
  3. A.K.Marnerides, M.R.Watson, N.Shirazi, A.Mauthe, andD.Hutchison, "Malware analysis in cloud computing: Networkand system characteristics," in Proc. IEEE Globe com Workshop,2013, pp. 0482-0487.
  4. M.R.Watson, N.Shirazi, A.K.Marnerides, A.Mauthe, and D.Hutchison,"Towards a distributed, self-organizing approach tomalware detection in cloud computing," in Proc.07th IFIP/IFISCIWSOS, 2013, pp.0182-0185.
  5. M. Garnaeva. Kelihos/Hlux Botnet Returns with New Techniques.Securelist Online]. Available:http://www.securelist.com/en/log/655/kelihos_Hlux_botnet_returns_with New_techniques,Febr.02012.
  6. H.Binsalleeh, T.Ormerod, A.Boukhtouta, P.Sinha, A.Youssef,M.Debbabi, and L. Wang, "On the analysis of the zeusbotnet crimewaretoolkit," in Proc.08th Annu. Int.Conf. Privacy Security Trust,Aug. 2010, pp.031-038.
  7. A.K.Marnrides, P.Spachose, P.Chatzimisiose, A. Mauth "Malware detection in the cloud under ensemble empirical modeldecomposition,"in Pro.|6th I.E.EE. Inti.Confe.Netwk.Compu.,02015.pp.082-088.
  8. L.Kaufeman,"Data security in the world of cloud computing," I.E.EE. Securitey Privacey,vole.07,nu.04,pp.061-064,July./02009.
  9. M.Christodoresc ,R.Sailr, D.L.Schals, D.Sagandurra, and D.Zambonie, "Cloud security is not (just) virtualization security:A short paper,"Pro.ACM. Workshope*Cloud Comput|.Securitye,NewYork,NY,USA,02009, pp.097-0102.
  10. N.U.H.Shiraz, S.Simpsun, A.Marnerides, M.Watsun, A.Mauthe, andD.Hutchison, "Assessing the impact of intra-cloud live migration on anomaly detection,"in*Cloud Networkings (/CloudNet*),02014 IE|E|E 03rd Internationeal Conferenceon,Oct02014, pp. 052-057.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Megha Rani Raigonda, Shivasharanappa, " Preventing System from Malware Effect in Cloud Computing Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.155-162, July-August-2017.