Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Cloud Malware and Malware Detection Survey


Affiliations
1 Department of Computer Science, Minia University, Egypt
2 Department of Computer Science, Cairo University, Egypt
     

   Subscribe/Renew Journal


Malware affects computing systems like cloud systems through its malicious actions towards confidentiality, availability, and integrity of system resources and services. Because of the deployment of Cloud Computing environment is increasingly common, and we are implicitly reliant on them for many services as it offers cost-saving service for Cloud user. So, it is important to take care of Cloud Security.

In this paper, we investigate a survey on malware types that may exploit Cloud Computing systems; in the next sections, different aspects of malware detection techniques and types are discussed and how these malware detection systems fit into the cloud computing system architecture. Finally, a comparison between malware detection sensors is provided through many points like modeling techniques, main components, scalability, open source availability, and a risk analysis for those detection systems.


Keywords

Cloud Computing, Computing Systems, Cloud Security, Malware, Malware Detection Techniques, Malicious, Sensors.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 235

PDF Views: 2




  • Cloud Malware and Malware Detection Survey

Abstract Views: 235  |  PDF Views: 2

Authors

R. Emad El-Dein
Department of Computer Science, Minia University, Egypt
B. Youssef
Department of Computer Science, Cairo University, Egypt
S. ElGamal
Department of Computer Science, Cairo University, Egypt

Abstract


Malware affects computing systems like cloud systems through its malicious actions towards confidentiality, availability, and integrity of system resources and services. Because of the deployment of Cloud Computing environment is increasingly common, and we are implicitly reliant on them for many services as it offers cost-saving service for Cloud user. So, it is important to take care of Cloud Security.

In this paper, we investigate a survey on malware types that may exploit Cloud Computing systems; in the next sections, different aspects of malware detection techniques and types are discussed and how these malware detection systems fit into the cloud computing system architecture. Finally, a comparison between malware detection sensors is provided through many points like modeling techniques, main components, scalability, open source availability, and a risk analysis for those detection systems.


Keywords


Cloud Computing, Computing Systems, Cloud Security, Malware, Malware Detection Techniques, Malicious, Sensors.