Refine your search
Collections
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Rani, Sangeeta
- Android Malware Detection in Official and Third Party Application Stores
Abstract Views :189 |
PDF Views:1
Authors
Affiliations
1 I.K Gujral Punjab Technical University, Punjab, IN
2 Baba Banda Singh Bahadur Engg College, Fatehgarh Sahib, Punjab, IN
1 I.K Gujral Punjab Technical University, Punjab, IN
2 Baba Banda Singh Bahadur Engg College, Fatehgarh Sahib, Punjab, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 4 (2018), Pagination: 3506-3509Abstract
Android is one of the most popular operating system for mobile devices and tablets. The growing number of Android users and open source nature of this platform has also attracted attackers to target Android devices. This paper presents the static and dynamic analysis of the Android applications in order to detect malware. In this work, we have performed permission based and behavioural based filtering of Android applications with the help of malware analysis tools. Our results revel that 80% of the applications request for dangerous permissions. 13% applications consist of malicious activities. Most of the applications are interested in the device data like contact lists, IMEI, IMSI, SMS etc. These results clearly indicate the need for better security measures for Android apps.Keywords
Android Malware, Static Analysis, Dynamic Analysis, Permissions, Applications.References
- A. P. Felt, K. Greenwood, and D. Wagner, The effectiveness of install-time permission systems for thirdparty applications, Technical report, University of California at Berkeley, UCB/EECS-2010-143, Dec 2010.
- D. Barrera, H. G. Kayacik, P. C. van Oorschot, and A. Somayaji, A methodology for empirical analysis of permission-based security models and its application to android, Proc. 17th ACM conference on Computer and communications security, ACM, New York, 2010, 73–84.
- A.P. Felt , E. Chin., S. Hanna, D. Song , D. Wagner, Android permissions demystified, Proc. 8th ACM conference on Computer and communications security, New York, USA. 2011b. 627-638.
- Y. Zhou and X. Jiang, Dissecting android malware: Characterization and evolution, Proc. IEEE Symposium on Security and Privacy, San Francisco, CA, USA, 2012, 95–109.
- A. P. Felt, M. Finifter, E. Chin, D. Wagner, A Survey of Mobile Malware in the Wild, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM '11), ACM, New York, USA, 2011, 3-14
- Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting malicious apps in official and alternative Android markets. Proceedings of the 19th Network and Distributed System Security Symposium, San Diego, CA, 317-326.
- M. Grace, Y. Zhou, Q. Zhang, S. Zou and X. Jiang , Riskranker: scalable and accurate zero-day android malware detection, Proc. International Conference on Mobile Systems, Applications, and Services, London, UK, 2012, 281–294.
- X. Wei, L. Gomez, I. Neamtiu, and M. Faloutsos, Malicious android applications in the enterprise: What do they do and how do we fix it?1, Proc. IEEE 28th International Conference on Data Engineering Workshops (ICDEW), 251–254, 2012.
- S. Holavanalli, D. Manuel, V. Nanjundaswamy, B. Rosenberg, F. Shen, S. Y. Ko, and L. Ziarek, Flow permissions for android, Proc. 28th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2013, 652–657,2013.
- Y. Zhang, M. Yang, B. Xu, Z. Yang, G. Gu, P. Ning, X. S. Wang, and B. Zang, Vetting undesirable behaviors in android apps with permission use analysis, Proc. 2013 ACM SIGSAC Conference on Computer & Communications Security, 611–622, 2013.
- P. Faruki, V. Ganmoor, V. Laxmi, M. S. Gaur, and A. Bharmal, Androsimilar: Robust statistical feature signature for android malware detection, Proc. International Conference on Security of Information and Networks (SIN’13), Aksaray, Turkey. ACM, 2013, 152– 159
- B. Rashidi, C. Fung, and T. Vu, Recdroid: A resource access permission control portal and recommendation service for smartphone users, Proc. 2014 ACM MobiCom Workshop on Security and Privacy in Mobile Environments (SPME’14), Maui, Hawaii, USA, 2014, 13– 18.
- A. R. Beresford, A. Rice, N. Skehin, and R. Sohan, Mockdroid: Trading privacy for application functionality on smartphones, Proc. 12th Workshop on Mobile Computing Systems and Applications (HotMobile’11), Phoenix, Arizona, USA. ACM, 2011, 49–54.
- I. Burguera, U. Zurutuza, and S. Nadjm-Tehrani, Crowdroid: Behavior-based malware detection system for android, Proc. 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM’11), Chicago, Illinois, USA, 2011, 15–26.
- Z. Aung, and W. Zaw, Permission-based Android malware detection, International Journal of Scientific & Technology Research, 2(3), 2013
- S. Ryo, D. Chiba, and S. Goto, Detecting Android Malware by Analyzing Manifest Files, Proc. Asia-Pacific Advanced Network , 2013, 23-31
- S. Rani, and K. Dhindsa, Behavioural Characterization of Android Malware to Detect Similar Malware, International Journal of Research in Electronics and Computer Engineering, 5(4), 2017, pp. 509-514
- A. Kapratwar, Static and Dynamic Analysis of Android Malware, Proc. 1st International Workshop on FORmal methods for Security Engineering In conjunction with the 3rd International Conference on Information Systems Security and Privacy, Porto, Portugal, 2017
- F. Yuhui, and X. Ning, The Analysis of Android Malware Behaviors, International Journal of Security and Its Applications, 9(3), 2015, 335-346
- Features Exploration of Distinct Load Balancing Algorithms in Cloud Computing Environment
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 UTU, Dehradoon, IN
2 SGT University, Gurugram, IN
3 Quantum University, Roorkee, IN
4 PSIT, Kanpur, IN
1 UTU, Dehradoon, IN
2 SGT University, Gurugram, IN
3 Quantum University, Roorkee, IN
4 PSIT, Kanpur, IN
Source
International Journal of Advanced Networking and Applications, Vol 11, No 1 (2019), Pagination: 4177-4183Abstract
The delivery of Cloud computing is a method for delivering information /services in which resources are retrieved from the Internet through web-based tools and applications, as opposed to a direct connection to a server rather than keeping files on a proprietary hard drive or local storage device. We have studied a lot of algorithm for reducing the response time of load balancing algorithm in cloud computing environment. We also measured the execution time of different algorithms. In this paper we will compare execution time, processing time of data center, response time of various algorithms.References
- Nguyen Xuan Phi, Cao Trung Tin, Luu Nguyen Ky Thu and Tran Cong Hung, ‘”Proposed Load Balancing Algorithm to Reduce Response Time and Processing Time On Cloud Computing”, International Journal of Computer Networks & Communications (IJCNC), 2018
- Gurasis Singh, Kamalpreet Kaur, “An Improved Weighted Least Connection Scheduling Algorithm for Load Balancing in Web Cluster Systems”, International Research Journal of Engineering and Technology (IRJET), p-ISSN: 2395-0072, 2018.
- Violetta N. Volkova, Liudmila V. Chernenkaya, Elena N. Desyatirikova, Moussa Hajali, Almothana Khodar, Alkaadi Osama, “Load Balancing in Cloud Computing” IEEE, 2018.
- Devika Singh1, Ashish Vashisht, “An Improved Regulated Load Balancing Approach for Cloud Computing Environment”, International Journal of Research in Advent Technology, E-ISSN: 2321-9637, 2018,
- Sambit Kumar Mishra, Md Akram Khan, Bibhudatta Sahoo, Deepak Puthal, Mohammad S. Obaidat and KF Hsiao, “Time efficient dynamic threshold-based load balancing technique for Cloud Computing” IEEE International Conference on Computer, Information and Telecommunication Systems (CITS) , Dalian, China, 21-23 July 2017.
- Desyatirikova E. N., “Kuripta O. V. Quality management in IT service management based on statistical aggregation and decomposition approach”,"Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS) , 2017, pp. 500-505. DOI:10.1109/ITMQIS.2017.8085871.
- Sobhan Omranian-Khorasani and Mahmoud Naghibzadeh, “Deadline Constrained Load Balancing Level Based Workflow Scheduling for Cost Optimization”, IEEE International Conference on Computational Intelligence and Applications, Beijing, China 8-11 Sept 2017.
- Atyaf Dhari, Khaldun I. Arif , “An Efcient Load Balancing Scheme for Cloud Computing”,Indian Journal of Science and Technology,Vol 10(11), DOI:10.17485/ijst/v10i11/110107/2017.
- Simar P.S. Anju S. and Rajesh K.,” Analysis of load balancing algorithms using cloud analyst, International Journal of Grid and Distributed Computing”, vol. 9, No. 9, pp.11-24,2016.
- D. Saranya, L. Sankara Maheswari, “Load Balancing Algorithms in Cloud Computing: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Issue 7, 2015.
- Abhijit Aditya, Uddalak Chatterjee and Snehasis Gupta,” A Comparative Study of Different Static and Dynamic Load Balancing Algorithm in Cloud Computing with Special Emphasis on Time Factor”, International Journal of Current Engineering and Technology, P-ISSN 2347 – 5161,2015.
- Monika Kushwaha, Saurabh Gupta, “Various Schemes of Load Balancing in Distributed Systems- A Review”, International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 – 0882, Issue 7, J2015.
- Kumar Nishant, Pratik Sharma, Vishal Krishna, Chhavi Gupta and Kuwar Pratap Singh, Nitin and Ravi Rastogi,“LoadBalancingofNodesinCloudUsingA nt colonyOptimization”,International Conference on Modelling and Simulation, 2012.
- Calheiros R.N. ,”CloudSim: A Novel Framework for Modeling and Simulation of Cloud Computing Infrastructures and Services, Eprint: Australia, pp.9–17,2009.
- Anna Levina, Dean Lorenza, Giovanni Merlinob,Alfonso Panarellob, Antonio Puliafitob, Giuseppe Tricomib,”Hierarchical Load Balancing as a service for federated Cloud networks”, Computer communications (2018), doi:10.1016/j.comcom.2018.07.031.
- Maximal Security Issues and Threats Protection in Grid and Cloud Computing Environment
Abstract Views :162 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, SRM-IST Campus, Ghaziabad, IN
2 Department of Computer Science, SGT University, Gurugram, IN
3 Department of Computer Science, SGT University, Gurugram, IS
1 Department of Computer Science, SRM-IST Campus, Ghaziabad, IN
2 Department of Computer Science, SGT University, Gurugram, IN
3 Department of Computer Science, SGT University, Gurugram, IS
Source
International Journal of Advanced Networking and Applications, Vol 11, No 4 (2020), Pagination: 4367-4373Abstract
Cloud computing empowers the sharing of assets for example, storage, network,applications and programming through web. Cloud clients can rent various assets agreeing to their necessities, and pay just for the administrations they use. Be that as it may, in spite of all cloud benefits there are numerous security concerns identified with equipment, virtualization, network, information and specialist organizations thatgo about as a noteworthy obstruction in the selection of cloud in the IT business. In this paper,we overview the top security concerns identified with cloud computing. For each of these security threats we depict, I) how itvery well may be utilized to abuse cloud parts and its impact on cloud elements, for example, suppliers and clients, and ii) the security arrangements that must be taken to forestall these threats. Thesearrangements incorporate the security procedures from existing writing just as the best security rehearses that must be trailed by cloud heads.Keywords
Cloud Computing, Data Security, Network Security.- A Perspective for Intrusion Detection & Prevention in Cloud Environment
Abstract Views :224 |
PDF Views:1
Authors
Vaneeta
1,
Sangeeta Rani
2
Affiliations
1 Research Scholar, Department of Computer Science, Punjabi University, Patiala, IN
2 Assistant Professor, Department of Computer Science, Mata Gujri College, Fatehgarh Sahib, IN
1 Research Scholar, Department of Computer Science, Punjabi University, Patiala, IN
2 Assistant Professor, Department of Computer Science, Mata Gujri College, Fatehgarh Sahib, IN
Source
International Journal of Advanced Networking and Applications, Vol 12, No 6 (2021), Pagination: 4770-4775Abstract
The cloud environment is used in all sectors that provide different services to the users. The assistance provided by the cloud environment in different sectors such as business, entertainment, government, education, IT industry, etc. The services rendered by both the public and private organizations considering scalable, on a payas-you-go basis, on-demand services, etc. Due to its dispersed nature and viability in all the sectors, makes the system inefficient which causes numerous attacks in the environment. These attacks affect the confidentiality, integrity, and availability of cloud resources. Some examples of attacks are Ransomware, man-in-the-middle attacks, Denial of service attacks, insider attacks, etc. Thus, Intrusion Detection System (IDS) and Intrusion Prevention System (IPS) play a crucial role in the cloud environment by detecting and preventing the system from suspicious attacks. The objective of this paper is to provide information about attacks that affect the cloud environment. This paper also covers the different techniques of intrusion detection, intrusion prevention, and its hybrid approach.Keywords
Cloud Computing, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Intrusion Detection and Prevention System (IDPS)References
- J. K. Samriya and N. Kumar, “A novel intrusion detection system using hybrid clustering optimization approach in cloud computing,” Mater. Today Proc., no. xxxx, 2020, doi: 10.1016/j.matpr.2020.09.614.
- P. Singh and V. Ranga, “Attack and intrusion detection in cloud computing using an ensemble learning approach,” Int. J. Inf. Technol., 2021, doi: 10.1007/s41870-020-00583-w.
- K. Pradeep Mohan Kumar, M. Saravanan, M. Thenmozhi, and K. Vijayakumar, “Intrusion detection system based on GA-fuzzy classifier for detecting malicious attacks,” Concurr. Comput. , vol. 33, no. 3, pp. 5–10, 2021, doi: 10.1002/cpe.5242.
- S. R. K. Tummalapalli and A. S. N. Chakravarthy, “Intrusion detection system for cloud forensics using bayesian fuzzy clustering and optimization based SVNN,” Evol. Intell., no. 0123456789, 2020, doi: 10.1007/s12065-020-00410-y.
- G. Zhao, C. Rong, M. G. Jaatun, and F. E. Sandnes, “Reference deployment models for eliminating user concerns on cloud security,” J. Supercomput., vol. 61, no. 2, pp. 337–352, 2012, doi: 10.1007/s11227-010-0460-9.
- C. N. Modi, D. R. Patel, A. Patel, and M. Rajarajan, “Integrating Signature Apriori based Network Intrusion Detection System (NIDS) in Cloud Computing,” Procedia Technol., vol. 6, pp. 905–912, 2012, doi: 10.1016/j.protcy.2012.10.110.
- C. Point and S. Technologies, “SECURITY,” pp. 1–21, 2020.
- P. Sharma, J. Sengupta, and P. K. Suri, “WLIFCM and Artificial Neural Network Based Cloud Intrusion Detection System,” Int. J. Adv. Netw. Appl., vol. 10, no. 01, pp. 3698–3703, 2018, doi: 10.35444/ijana.2018.10014.
- S. M. Alturfi, D. K. Muhsen, M. A. Mohammed, I. T. Aziz, and M. Aljshamee, “A Combination Techniques of Intrusion Prevention and Detection for Cloud Computing,” J. Phys. Conf. Ser., vol. 1804, no. 1, 2021, doi: 10.1088/1742- 6596/1804/1/012121.
- C. Modi, D. Patel, B. Borisaniya, A. Patel, and M. Rajarajan, “A survey on security issues and solutions at different layers of Cloud computing,” J. Supercomput., vol. 63, no. 2, pp. 561–592, 2013, doi: 10.1007/s11227-012-0831-5.
- A. Patil, A. Laturkar, S. V. Athawale, R. Takale, and P. Tathawade, “A multilevel system to mitigate DDOS, brute force and SQL injection attack for cloud security,” IEEE Int. Conf. Information, Commun. Instrum. Control. ICICIC 2017, vol. 2018-Janua, pp. 1–7, 2018, doi: 10.1109/ICOMICON.2017.8279028.
- A. Gursaran, “U Sing G Enetic a Lgorithm,” vol. 3, no. 3, pp. 447–450, 2010.
- C. Modi, D. Patel, B. Borisaniya, and H. Patel, “Journal of Network and Computer Applications A survey of intrusion detection techniques in Cloud,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 42–57, 2013, doi: 10.1016/j.jnca.2012.05.003.
- K. W. I and V. Hou, “Detection Method of SQL injection Attack in Cloud,” pp. 487–493.
- C. N. Modi and K. Acha, “Virtualization layer security challenges and intrusion detection/prevention systems in cloud computing: a comprehensive review,” J. Supercomput., vol. 73, no. 3, pp. 1192–1234, 2017, doi: 10.1007/s11227-016-1805-9.
- S. Alam, M. Shuaib, and A. Samad, A Collaborative Study of Intrusion Detection and Prevention Techniques in Cloud Computing. Springer Singapore.
- N. Das and T. Sarkar, “Survey on Host and Network Based Intrusion Detection System,” Int. J. Adv. Netw. Appl., vol. 6, no. 2, pp. 2266 –2269, 2014.
- P. P. Chapke and R. R. Deshmukh, “Intrusion Detection System using fuzzy logic and data mining technique,” ACM Int. Conf. Proceeding Ser., vol. 06 -07 -Marc, 2015, doi: 10.1145/2743065.2743128.
- K. Bakour, G. S. Daş, and H. M. Ünver, “An intrusion detection system based on a hybrid tabu - genetic algorithm,” 2nd Int. Conf. Comput. Sci. Eng. UBMK 2017, pp. 215 –220, 2017, doi: 10.1109/UBMK.2017.8093378.
- H. Jin et al., “A VMM -based intrusion prevention system in cloud computing environment,” J. Supercomput., vol. 66, no. 3, pp. 1133 –1151, 2013, doi: 10.1007/s11227 -011 -0608 -2.
- S. Das and M. J. Nene, “A survey on types of machine learning techniques in intrusion prevention systems,” Proc. 2017 Int. Conf. Wirel. Commun. Signal Process. Networking, WiSPNET 2017, vol. 2018 -Janua, pp. 2296 –2299, 2018, doi: 10.1109/WiSPNET.2017.8300169.
- A. Patel, M. Taghavi, K. Bakhtiyari, and J. Celestino Júnior, “An intrusion detection and prevention system in cloud computing: A systematic review,” J. Netw. Comput. Appl., vol. 36, no. 1, pp. 25 –41, 2013, doi: 10.1016/j.jnca.2012.08.007.