BASED ON GREEN COMPUTING WORLD, THE HYBRID MALWARE DETECT MEMORY MAPPER IN KERNEL CENTRIC VIRTUAL MACHINE

Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 4

Abstract

Kernel malwares can provide user level-malware characteristics with additional probabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. Many research proceeds on malware hooking behavior and defense and preventive actions for the same. Still, an automated analysis of the actual malicious goals and patching the behavior is not investigated properly. Hybrid Malware detect memory Mapped provides an optimized solution to analyze extract malicious behaviors from root kits and windows kernel-level code, including sensitive data access, modification and triggers. A new technique which provides a combination of backward slicing option to check the mapped memory by slicing step by step in the kernel level. It will identify the malware influenced sensitive data and possible solution for this problem

Authors and Affiliations

Priyanka E. , Jayachandran J

Keywords

Related Articles

SURVEY ON EFFICIENT AND ENHANCED RESOURCE ALLOCATION FOR WORKFLOW IN CLOUD COMPUTING

Cloud computing is delivery of services over internet that shares the resources on demand. Resources utility can be increased or decreased as per demand. Cloud computing offer users to pay only for w...

SECURE PRIVACY PRESERVING TECHNIQUES IN SMART PHONES : A REVIEW

The context aware applications are blooming with increasing the popularity of smartphones with sensors, these sensor applications arises the privacy is the major challenging issue because users...

PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS

Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by...

Economic and Energy Optimization by Joint Scheduling in Cloud Computing

Cloud computing technologies have empowered a new-fangled paradigm for progressive product advancement by the establishment and contribution of services in a multi-tenant disseminated simulation environment. A novel join...

ADAPTIVE COOPERATION OF MULTIPLE DEVICES IN MODEL DRIVEN DEVELOPMENT PATTERNS IN CLOUD

Cloud computing is an internet based computing which store and access the data instead of the computer hard drive. The combination of cloud computing, mobile computing and wireless networks are calle...

Download PDF file
  • EP ID EP399985
  • DOI -
  • Views 108
  • Downloads 0

How To Cite

Priyanka E. , Jayachandran J (2015). BASED ON GREEN COMPUTING WORLD, THE HYBRID MALWARE DETECT MEMORY MAPPER IN KERNEL CENTRIC VIRTUAL MACHINE. Elysium Journal of Engineering Research and Management, 2(4), -. https://europub.co.uk/articles/-A-399985