A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques
Title | A Zero-Day Resistant Malware Detection Method for Securing Cloud Using SVM and Sandboxing Techniques |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Kumar, S., Singh, C. Bhim Bhan |
Conference Name | 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT) |
ISBN Number | 978-1-5386-1974-2 |
Keywords | cloud computing, clouds, composability, computer security, Conferences, defense, feature extraction, IT infrastructure, machine learning, Malware, Metrics, n-class SVM, networking schemes, operating systems (computers), OS images, phase exhaustive technique, pubcrawl, resilience, Resiliency, sandboxing techniques, security of data, Support vector machines, SVM, Tools, user machine, Zero day attacks, Zero-day attacks, Zero-day resistance, zero-day resistant malware detection method |
Abstract | Cloud nowaday has become the backbone of the IT infrastructure. Whole of the infrastructure is now being shifted to the clouds, and as the cloud involves all of the networking schemes and the OS images, it inherits all of the vulnerabilities too. And hence securing them is one of our very prior concerns. Malwares are one of the many other problems that have ever growing and hence need to be eradicated from the system. The history of mal wares go long back in time since the advent of computers and hence a lot of techniques has also been already devised to tackle with the problem in some or other way. But most of them fall short in some or other way or are just too heavy to execute on a simple user machine. Our approach devises a 3 - phase exhaustive technique which confirms the detection of any kind of malwares from the host. It also works for the zero-day attacks that are really difficult to cover most times and can be of really high-risk at times. We have thought of a solution to keep the things light weight for the user. |
URL | https://ieeexplore.ieee.org/document/8473321 |
DOI | 10.1109/ICICCT.2018.8473321 |
Citation Key | kumar_zero-day_2018 |
- OS images
- zero-day resistant malware detection method
- Zero-day resistance
- Zero-day attacks
- Zero day attacks
- user machine
- tools
- SVM
- Support vector machines
- security of data
- sandboxing techniques
- Resiliency
- resilience
- pubcrawl
- phase exhaustive technique
- Cloud Computing
- operating systems (computers)
- networking schemes
- n-class SVM
- Metrics
- malware
- machine learning
- IT infrastructure
- feature extraction
- defense
- Conferences
- computer security
- composability
- clouds