Malware Propagation Detection in Mobile Cloud Infrastructure with Architectural Change
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 10
Abstract
Now a day’s a lot mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud services. This fresh infrastructure gives mobile instances which are virtual among cloud computing. To enter into marketing level various services containing this type of infrastructure, the people which give providers service have to know about these security openings. In this paper, we initially declare different mobile cloud services get into mobile cloud infrastructure and to discuss the security threats that might be chance through the usage of many service scenarios. Then, we explore architecture and methodology for abnormal behavior detection through the observation of host and network data. To check our methodology, we inserted malicious programs into our mobile cloud test be and utilized a machine learning algorithm to find out from those programs the abnormal behavior that arise.
Authors and Affiliations
Vengali Sagar , V. Ravi Kumar
Energy Efficient Scheme for Improving the Performance of Wireless Sensor Networks
The wireless sensor networks sensing the neighbor nodes to disseminated the information to every sensor nodes on the networks area. The random walk through topology is mentioning in this paper for obtaining the results o...
Security Issues and Sybil Attack in Wireless Sensor Networks
Due to broadcast nature of Wireless Sensor Networks and lack of tamper-resistant hardware, security in sensor networks is one of the major issues. Hence research is being done on many security attacks on wireless...
Malware Propagation Detection in Mobile Cloud Infrastructure with Architectural Change
Now a day’s a lot mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud servic...
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...
Review on Energy Conservation in Wireless Sensor Network
This is a review paper discussing what Wireless Sensor Networks are. Sensor nodes are battery powered devices and the main issue is how to reduce the energy consumption of nodes so that the networks lifetime can...