PROJECT TITLE :

Malware Detection in Cloud Computing Infrastructures

ABSTRACT:

Cloud services are distinguished at intervals the non-public, public and industrial domains. Several of those services are expected to be continually on and have a essential nature; so, security and resilience are increasingly vital aspects. In order to remain resilient, a cloud wants to possess the flexibility to react not solely to known threats, however conjointly to new challenges that focus on cloud infrastructures. In this paper we tend to introduce and discuss an online cloud anomaly detection approach, comprising dedicated detection parts of our cloud resilience architecture. More specifically, we have a tendency to exhibit the applicability of novelty detection below the one-category support Vector Machine (SVM) formulation at the hypervisor level, through the utilisation of options gathered at the system and network levels of a cloud node. We tend to demonstrate that our scheme can reach a high detection accuracy of over % whilst detecting various types of malware and DoS attacks. Furthermore, we tend to evaluate the merits of considering not solely system-level knowledge, but conjointly network-level knowledge relying on the attack type. Finally, the paper shows that our approach to detection using dedicated monitoring components per VM is significantly applicable to cloud situations and results in a versatile detection system capable of detecting new malware strains with no previous knowledge of their functionality or their underlying directions.


Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here


PROJECT TITLE : A Patient-Centric Healthcare Framework Reference Architecture for Better Semantic Interoperability based on Blockchain, Cloud, and IoT ABSTRACT: The application-centric perspective gives rise to the distributed
PROJECT TITLE : A Machine Learning Framework for Domain Generation Algorithm (DGA)-Based Malware Detection ABSTRACT: To alter communication, attackers typically employ a command and control (C2) server. Threat actors frequently
PROJECT TITLE : An efficient Android malware detection system based on method-level behavioral semantic analysis ABSTRACT: Every day, 12 000 new Android malware samples will be developed, according to a recent report. The efficient
PROJECT TITLE :MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention - 2018ABSTRACT:Android users are constantly threatened by an increasing variety of malicious applications (apps), generically
PROJECT TITLE : Yes, Machine Learning Can Be More Secure! A Case Study on Android Malware Detection - 2017 ABSTRACT: To address the increasing variability and class of modern attacks, machine learning has been widely adopted

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry