Detection of Worms Over Cloud Environment: A Literature Survey

Detection of Worms Over Cloud Environment: A Literature Survey

Thangavel M., Jeyapriya B., Suriya K. S.
Copyright: © 2018 |Pages: 29
ISBN13: 9781522530381|ISBN10: 152253038X|EISBN13: 9781522530398
DOI: 10.4018/978-1-5225-3038-1.ch006
Cite Chapter Cite Chapter

MLA

M., Thangavel, et al. "Detection of Worms Over Cloud Environment: A Literature Survey." Cloud Computing Technologies for Green Enterprises, edited by Kashif Munir, IGI Global, 2018, pp. 137-165. https://doi.org/10.4018/978-1-5225-3038-1.ch006

APA

M., T., B., J., & S., S. K. (2018). Detection of Worms Over Cloud Environment: A Literature Survey. In K. Munir (Ed.), Cloud Computing Technologies for Green Enterprises (pp. 137-165). IGI Global. https://doi.org/10.4018/978-1-5225-3038-1.ch006

Chicago

M., Thangavel, Jeyapriya B., and Suriya K. S. "Detection of Worms Over Cloud Environment: A Literature Survey." In Cloud Computing Technologies for Green Enterprises, edited by Kashif Munir, 137-165. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-3038-1.ch006

Export Reference

Mendeley
Favorite

Abstract

In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high-intelligent to gather the payload of zero-day polymorphic heterogeneous and homogeneous stages in distributed computing. The Signature-based discovery of worms strategies work with a low false-positive rate. We propose an irregularity based interruption location instrument for the cloud which specifically benefits from the virtualization advancements all in all. Our proposed abnormality location framework is detached from spreading computer worm contamination and it can recognize new computer worms. Utilizing our methodology, a spreading computer worm can be distinguished on the spreading conduct itself without getting to or straightforwardly affecting running virtual machines of the cloud.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.