scispace - formally typeset
Proceedings ArticleDOI

Cache implementation using collective intelligence on cloud based antivirus architecture

Reads0
Chats0
TLDR
This work suggests using two-way caching scheme where local-cache is stored on client system and cloud- cache is present on network cloud, where the authors store virus definitions and behaviors according to collective intelligence techniques, to increase the optimality of virus definition search.
Abstract
Antivirus is most widely used to detect and stop malware and other unwanted files. Cloud antivirus is a malware detector architecture where virus definitions and other behaviors of suspicious files is analyzed on cloud and controlled by a light weight Agent on client system. We suggest using two-way caching scheme where local-cache is stored on client system and cloud-cache is present on network cloud, where we store virus definitions and behaviors according to collective intelligence techniques. Local-cache is used to detect the virus and other malware files while offline and cloud-cache uses the Artificial Intelligence Techniques for whole client base to get the most susceptible and prone virus and malware definitions thus increasing the optimality of virus definition search and hence the speed of the whole process gets increased.

read more

Citations
More filters
Journal ArticleDOI

Understanding uses and misuses of similarity hashing functions for malware detection and family clustering in actual scenarios

TL;DR: In this article, an ideal model of similarity hashing-based antivirus engine SHAVE is introduced, which consists of applying two distinct hash functions (ssdeep and sdhash) to a dataset of 21 thousand actual malware samples collected over four years.
Posted Content

Machine Learning (In) Security: A Stream of Problems.

TL;DR: This work lists, detail, and discusses some of the challenges of applying ML to cybersecurity, including concept drift, concept evolution, delayed labels, and adversarial machine learning, and shows how existing solutions fail and proposes possible solutions to fix them.
Journal ArticleDOI

Impact Assessment and Defense for Smart Grids With FDIA Against AMI

TL;DR: In this article , an impact assessment framework for smart grids suffering false data injection attack against smart meters is proposed, which enhances the grid's vulnerability through effectively deploying defense resources in smart meter networks.
Journal ArticleDOI

Impact Assessment and Defense for Smart Grids With FDIA Against AMI

TL;DR: In this paper , an impact assessment framework for smart grids suffering false data injection attack against smart meters is proposed, which enhances the grid's vulnerability through effectively deploying defense resources in smart meter networks.
References
More filters
Journal ArticleDOI

Cloud Computing – Issues, Research and Implementations

TL;DR: The concept of “ cloud” computing, some of the issues it tries to address, related research topics, and a “cloud” implementation available today are discussed.
Proceedings ArticleDOI

Cloud computing — Issues, research and implementations

TL;DR: This paper discusses the concept of ldquocloudrdquo computing, issues it tries to address, related research topics, and a ldquistocloud thirdquo implementation available today.
Proceedings Article

CloudAV: N-version antivirus in the network cloud

TL;DR: It is shown that the average length of time to detect new threats by an antivirus engine is 48 days and that retrospective detection can greatly minimize the impact of this delay, and a new model for malware detection on end hosts based on providing antivirus as an in-cloud network service is advocated.
Proceedings Article

A probabilistic approach to fast pattern matching in time series databases

TL;DR: The proposed approach provides a natural framework to support user-customizable "query by content" on time series data, taking prior domain information into account in a principled manner.
Journal ArticleDOI

Malware Detection in Cloud Computing Infrastructures

TL;DR: The paper shows that the approach to detection using dedicated monitoring components per VM is particularly applicable to cloud scenarios and leads to a flexible detection system capable of detecting new malware strains with no prior knowledge of their functionality or their underlying instructions.
Related Papers (5)