Redirigiendo al acceso original de articulo en 18 segundos...
ARTÍCULO
TITULO

Malware Detection in Cloud Environment (MDCE)

Mahmoud M. El-Khouly    
Samir Abou El-Seoud    

Resumen

Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber criminals. In this paper, we present the current threats to the cloud environment, and the proposed detection systems for malware in the cloud environment. We then present a multiple detection system that is aimed at combating the spread of malware by cloud environment.

Palabras claves

 Artículos similares

       
 
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula    
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ... ver más
Revista: Information

 
Jeonggeun Jo, Jaeik Cho and Jongsub Moon    
Artificial intelligence (AI) is increasingly being utilized in cybersecurity, particularly for detecting malicious applications. However, the black-box nature of AI models presents a significant challenge. This lack of transparency makes it difficult to ... ver más
Revista: Applied Sciences

 
Norah Abanmi, Heba Kurdi and Mai Alzamel    
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma... ver más
Revista: Applied Sciences

 
Abigail Copiaco, Leena El Neel, Tasnim Nazzal, Husameldin Mukhtar and Walid Obaid    
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extractio... ver más
Revista: Applied Sciences

 
Yuxin Zhang, Shumian Yang, Lijuan Xu, Xin Li and Dawei Zhao    
As the amount of malware has grown rapidly in recent years, it has become the most dominant attack method in network security. Learning execution behavior, especially Application Programming Interface (API) call sequences, has been shown to be effective ... ver más
Revista: Applied Sciences