Cited 0 time in
3-Tier Malware Detection on Cloud Computing
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Jeon, Jueun | - |
| dc.contributor.author | Jeong, Byeonghui | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.date.accessioned | 2024-11-11T08:00:11Z | - |
| dc.date.available | 2024-11-11T08:00:11Z | - |
| dc.date.issued | 2024-09 | - |
| dc.identifier.issn | 1876-1100 | - |
| dc.identifier.issn | 1876-1119 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/56183 | - |
| dc.description.abstract | With the proliferation of cloud computing, the need for advanced security measures in the cloud has become critical. Traditional malware detection methods, which are often limited to single-tier approaches, have become increasingly inadequate against evolving cyber threats. This research presents a comprehensive 3-tier malware detection framework explicitly designed for cloud computing environments. This system integrates data classification, behavioral analysis, and heuristic techniques to provide a multi-layered defense mechanism. The first tier, data classification, uses machine learning models to categorize incoming data and flag potential threats. The second, behavioral analysis, monitors complex data interactions and captures unusual patterns that indicate malware activity. The final tier, heuristics, refines the detection process using expert-driven rules derived from historical malware data. Together, these tiers provide enhanced security against both known malware and emerging zero-day threats. The findings in this paper provide a blueprint for a future where cloud environments can be more resilient and secure against malicious activity. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. | - |
| dc.format.extent | 4 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Springer Science and Business Media Deutschland GmbH | - |
| dc.title | 3-Tier Malware Detection on Cloud Computing | - |
| dc.type | Article | - |
| dc.publisher.location | 독일 | - |
| dc.identifier.doi | 10.1007/978-981-97-2447-5_1 | - |
| dc.identifier.scopusid | 2-s2.0-85206211831 | - |
| dc.identifier.bibliographicCitation | Advances in Computer Science and Ubiquitous Computing, v.1190, pp 3 - 6 | - |
| dc.citation.title | Advances in Computer Science and Ubiquitous Computing | - |
| dc.citation.volume | 1190 | - |
| dc.citation.startPage | 3 | - |
| dc.citation.endPage | 6 | - |
| dc.type.docType | Conference Paper | - |
| dc.description.isOpenAccess | N | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Behavioral Analysis | - |
| dc.subject.keywordAuthor | Cloud Computing | - |
| dc.subject.keywordAuthor | Heuristic Technique | - |
| dc.subject.keywordAuthor | Malware Detection | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
