Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

3-Tier Malware Detection on Cloud Computing

Full metadata record
DC Field Value Language
dc.contributor.authorJeon, Jueun-
dc.contributor.authorJeong, Byeonghui-
dc.contributor.authorJeong, Young-Sik-
dc.date.accessioned2024-11-11T08:00:11Z-
dc.date.available2024-11-11T08:00:11Z-
dc.date.issued2024-09-
dc.identifier.issn1876-1100-
dc.identifier.issn1876-1119-
dc.identifier.urihttps://scholarworks.dongguk.edu/handle/sw.dongguk/56183-
dc.description.abstractWith the proliferation of cloud computing, the need for advanced security measures in the cloud has become critical. Traditional malware detection methods, which are often limited to single-tier approaches, have become increasingly inadequate against evolving cyber threats. This research presents a comprehensive 3-tier malware detection framework explicitly designed for cloud computing environments. This system integrates data classification, behavioral analysis, and heuristic techniques to provide a multi-layered defense mechanism. The first tier, data classification, uses machine learning models to categorize incoming data and flag potential threats. The second, behavioral analysis, monitors complex data interactions and captures unusual patterns that indicate malware activity. The final tier, heuristics, refines the detection process using expert-driven rules derived from historical malware data. Together, these tiers provide enhanced security against both known malware and emerging zero-day threats. The findings in this paper provide a blueprint for a future where cloud environments can be more resilient and secure against malicious activity. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024.-
dc.format.extent4-
dc.language영어-
dc.language.isoENG-
dc.publisherSpringer Science and Business Media Deutschland GmbH-
dc.title3-Tier Malware Detection on Cloud Computing-
dc.typeArticle-
dc.publisher.location독일-
dc.identifier.doi10.1007/978-981-97-2447-5_1-
dc.identifier.scopusid2-s2.0-85206211831-
dc.identifier.bibliographicCitationAdvances in Computer Science and Ubiquitous Computing, v.1190, pp 3 - 6-
dc.citation.titleAdvances in Computer Science and Ubiquitous Computing-
dc.citation.volume1190-
dc.citation.startPage3-
dc.citation.endPage6-
dc.type.docTypeConference Paper-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscopus-
dc.subject.keywordAuthorBehavioral Analysis-
dc.subject.keywordAuthorCloud Computing-
dc.subject.keywordAuthorHeuristic Technique-
dc.subject.keywordAuthorMalware Detection-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Police and Criminal Justice > Department of Police Administration > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Jeong, Young Sik photo

Jeong, Young Sik
College of Advanced Convergence Engineering (Department of Computer Science and Artificial Intelligence)
Read more

Altmetrics

Total Views & Downloads

BROWSE