Malware Detection In Cloud Computing

Authors

  • Sadanandan A Master of computer applications, Hindusthan College of Arts and Science(Autonomous), Affliciated by Bharathiar University , Coimbatore, Tamil Nadu, India
  • Poovarasan T Master of computer applications, Hindusthan College of Arts and Science(Autonomous), Affliciated by Bharathiar University , Coimbatore, Tamil Nadu, India
  • Kavitha V Hindusthan College of Arts and Science (Autonomous), Affliciated by Bharathiar University, Coimbatore, Tamil Nadu, India
  • Reavthy N Hindusthan College of Arts and Science (Autonomous), Affliciated by Bharathiar University, Coimbatore, Tamil Nadu, India

DOI:

https://doi.org/10.26438/ijcse/v6i11.237241

Keywords:

Cloud computing, threats, antivirus, security, deployability, resilience, malware

Abstract

In recent years the usage of cloud computing were emerged in big aspects. Hence the security of this big systems were in danger due to the intrusion and stealing of personal data. Inspite there are many primitive measures and antivirus tools were used in the cloud but they are not much effective in nature of modern malwares. Inorder to withstand or recover quickly from difficult conditions the cloud has to react towards not only to the known threats, but also to prevent against the new objection. This paper includes in about an approach in detection of malwares in cloud infrastructure. This approach provides greater efficiency in detection of malwares enhanced forensics capabilities and improved deployability. In this paper we join together detection techniques, Behavioral Blocking and Heuristic Analysis or Pro-Active Defense. Using this mechanism we find that cloud-malware detection provides better detection against recent threats compared to a single antivirus engine and a 98% detection rate across the cloud environment.

References

[1] Bo Li, Eul Gyu I`m “ A signature matching optimization policy for antivirus programs” Electronics and Computer Engineering, Hanyang University, Seoul, Korea. © IEEE 2011

[2] S. Subashini, V. Kavitha s.l “A survey of security issues in service delivery models of cloud computing.” .Science Direct, Journal of Network and Computer Applications, pp. (1-11) January (2011)

[3] Scott Treadwell, Mian Zhou “A Heuristic Approach for Detection of Obfuscated Malware”, Bank of America, 1201 Main St, Dallas, TX 75202, © IEEE 2009.

[4] Lajos Nagy, Richard Ford, and William Allen, “N-version programming for the detection of zero-day exploits”, In IEEE Topical Conference on Cybersecurity, Daytona Beach, Florida, USA, 2006.

[5] A. Ibrahim, J. Hamlyn-Harris, J. Grundy, and M. Almorsy, “Cloudsec: A security monitoring appliance for virtual machines in the iaas cloud model,” in Network and System Security (NSS), 2011 5th International Conference on, Sept 2011, pp. 113–120.

[6] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detection: A survey,” ACM Computing Surveys (CSUR), vol. 41, no. 3, p. 15, 2009.

[7] A. K. Marnerides, M. R. Watson, N. Shirazi, A. Mauthe, and D. Hutchison, “Malware analysis in cloud computing: Network and system characteristics,” IEEE Globecom 2013, 2013.

[8] C. Wang, V. Talwar, K. Schwan, and P. Ranganathan, “Online detection of utility cloud anomalies using metric distributions,” in Network Operations and Management Symposium (NOMS), 2010 IEEE. IEEE, 2010, pp. 96–103.

[9] S.K. Sharma, L. Gupta, “A Novel Approach for Cloud Computing Environment”, International Journal of Computer Sciences and Engineering, Vol. 4, Issue.12, pp.1-5, 2014.

[10] S.L. Mewada, C. Srivastava, “A Novel Approach for Cloud Environment”, International Journal of Computer Sciences and Engineering, Vol. 4, No.10, pp.1-15, 2010.

Downloads

Published

2025-11-18
CITATION
DOI: 10.26438/ijcse/v6i11.237241
Published: 2025-11-18

How to Cite

[1]
A. Sadanandan, T. Poovarasan, V. Kavitha, and N. Reavthy, “Malware Detection In Cloud Computing”, Int. J. Comp. Sci. Eng., vol. 6, no. 11, pp. 237–241, Nov. 2025.

Issue

Section

Research Article