A rule based probabilistic technique for malware code detection

Security is one of the major concerns in generic computing system which is used in our day to day life to deal with various aspects like education, banking, communication, entertainment etc. Security is obtained to prevent threats that usually affect the end users of other areas as well (like grid computing, cloud computing etc.). Malicious code deployment is the main cause of threat. This paper mainly proposes a novel malicious code detection technique (Rule based probabilistic malware detection (RBPMD)) which provides security in the traditional computing system. In this paper, RBPMD technique follows a rule based probabilistic technique to detect the malicious codes among several codes and warn the other non-infected guest machines about it. A prototype of RBPMD is designed and implemented in this paper. It creates less overhead as well as occupies less storage space compare to other well-known anti-viruses. Its implementation cost is also low compare to others. At last, a comparison analysis of this proposed technique is given with other popular malware detection techniques.

[1]  James A. Thom,et al.  Cloud Computing Security: From Single to Multi-clouds , 2012, 2012 45th Hawaii International Conference on System Sciences.

[2]  Hans P. Reiser,et al.  CloudIDEA: A Malware Defense Architecture for Cloud Data Centers , 2015, OTM Conferences.

[3]  Shikha Singh,et al.  Cloud Computing Attacks: A Discussion With Solutions , 2014, CloudCom 2014.

[4]  Nataasha Raul,et al.  Malware Detection Module using Machine Learning Algorithms to Assist in Centralized Security in Enterprise Networks , 2012, ArXiv.

[5]  Rao Mikkilineni,et al.  Next Generation Cloud Computing Architecture: Enabling Real-Time Dynamism for Shared Distributed Physical Infrastructure , 2010, 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises.

[6]  Yanfang Ye,et al.  ISMCS: An intelligent instruction sequence based malware categorization system , 2009, 2009 3rd International Conference on Anti-counterfeiting, Security, and Identification in Communication.

[7]  Madihah Mohd Saudi,et al.  A SYSTEMATIC ANALYSIS ON WORM DETECTION IN CLOUD BASED SYSTEMS , 2015 .

[8]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.

[9]  Shahid Alam,et al.  In-Cloud Malware Analysis and Detection: State of the Art , 2014, SIN.

[10]  Dan C. Marinescu,et al.  Cloud Computing: Theory and Practice , 2013 .

[11]  Hinna Hafeez Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments , 2017 .

[12]  S. Parik,et al.  Malware Detection in Cloud Computing Infrastructures , 2015 .

[13]  David Hutchison,et al.  Malware analysis in cloud computing: Network and system characteristics , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).

[14]  Mattia Monga,et al.  Detecting Self-mutating Malware Using Control-Flow Graph Matching , 2006, DIMVA.

[15]  Survey on Malware Detection Methods , 2009 .

[16]  Christie Williams Applications of Genetic Algorithms to Malware Detection and Creation , 2009 .

[17]  Md. Rafiqul Islam,et al.  Classification of malware based on integrated static and dynamic features , 2013, J. Netw. Comput. Appl..

[18]  Yanfang Ye,et al.  CIMDS: Adapting Postprocessing Techniques of Associative Classification for Malware Detection , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[19]  R. Sarala,et al.  Detection of Malicious Code-Injection Attack Using Two Phase Analysis Technique , 2012 .

[20]  Manish Sahu,et al.  A Review of Malware Detection Based on Pattern Matching Technique , 2014 .

[21]  Kirti Mathur,et al.  A Survey on Techniques in Detection and Analyzing Malware , 2013 .

[22]  Terran Lane,et al.  Improving malware classification: bridging the static/dynamic gap , 2012, AISec.

[23]  Xiaolei Wang,et al.  Accurate mobile malware detection and classification in the cloud , 2015, SpringerPlus.

[24]  Anirban Kundu,et al.  Memory utilization in cloud computing using transparency , 2010, 5th International Conference on Computer Sciences and Convergence Information Technology.

[25]  Ali A. Ghorbani,et al.  Automated malware classification based on network behavior , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[26]  Farzad Sabahi,et al.  Secure Virtualization for Cloud Environment Using Hypervisor-based Technology , 2012 .

[27]  Roberto Di Pietro,et al.  Secure virtualization for cloud computing , 2011, J. Netw. Comput. Appl..

[28]  Safaa Salam Hatem,et al.  Malware Detection in Cloud Computing , 2014 .

[29]  Daniele Sgandurra,et al.  Cloud security is not (just) virtualization security: a short paper , 2009, CCSW '09.

[30]  Igor Santos,et al.  OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection , 2012, CISIS/ICEUTE/SOCO Special Sessions.

[31]  M. P. Wankhade,et al.  Malware and Malware Detection Techniques : A Survey , 2013 .

[32]  Eystein Mathisen,et al.  Security challenges and solutions in cloud computing , 2011, 5th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2011).

[33]  Mladen A. Vouk,et al.  Cloud Computing – Issues, Research and Implementations , 2008, CIT 2008.

[34]  Dilshan Keragala,et al.  Detecting Malware and Sandbox Evasion Techniques , 2018 .

[35]  Atish,et al.  Securing Software as a Service Model of Cloud Computing: Issues and Solutions , 2014 .

[36]  Mladen A. Vouk,et al.  Cloud computing — Issues, research and implementations , 2008, ITI 2008 - 30th International Conference on Information Technology Interfaces.