Malware Propagation Detection in Mobile Cloud Infrastructure with Architectural Change
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 10
Abstract
Now a day’s a lot mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances which are virtual among cloud computing. To enter into marketing level various services containing this type of infrastructure, the people which give providers service have to know about these security openings. In this paper, we initially declare different mobile cloud services get into mobile cloud infrastructure and to discuss the security threats that might be chance through the usage of many service scenarios. Then, we explore architecture and methodology for abnormal behavior detection through the observation of host and network data. To check our methodology, we inserted malicious programs into our mobile cloud test be and utilized a machine learning algorithm to find out from those programs the abnormal behavior that arise.
Authors and Affiliations
Vengali Sagar , V. Ravi Kumar
Protected Data Forwarding by Erasure Coding to Cloud Storage System
Present so many mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services...
A Study of Asynchronous Routing Protocols in Peer to Peer Networks
Mobile Ad Hoc Network (MANET) is a self organized and self configurable network where the mobile nodes move arbitrarily. It is a collection of multi-hop wireless mobile nodes that communicate with each other without cent...
Mobile Ad-hoc Network Simulators, A Survey and Comparisons
Wireless communication technologies have been making growing interest in the past years, which has resulted in many proposals of their new applications. From indoor wireless local area networks to outdoor cellular mobile...
An Efficient Data Hiding Technique for Steganography
Bose Chaudhuri Hochquenghem (BCH) based data hiding scheme for JPEG steganography is presented. Traditional data hiding approaches hide data into each block, where all the blocks are not overlapping each other. Two conse...
DATAMINING: CLUSTERING (INFORMATION FROM RURAL VILLAGES OF SIVAGANGAI DISTRICT)
Research work is aimed to mining the rural villages of sivagangai district. Key factors to incorporated for mining information useful to village peoples and government are number of villages, number of families,...