A systematic analysis on worm detection in cloud based systems

An innovative breakthrough in computer science is cloud computing and involves several computers which are connected via the Internet or it is dispersed over a network. A large database, services, applications, software and resources are an integral part of this technology. It has the capability to...

Full description

Saved in:
Bibliographic Details
Main Authors: H.M., Kanaker, M.M., Saudi, M.F., Marhusin
Format: Article
Language:en_US
Published: Asian Research Publishing Network 2015
Subjects:
Online Access:http://ddms.usim.edu.my/handle/123456789/8502
http://www.arpnjournals.com/jeas/research_papers/rp_2015/jeas_0215_1488.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.usim-8502
record_format dspace
spelling my.usim-85022017-05-15T06:51:47Z A systematic analysis on worm detection in cloud based systems H.M., Kanaker M.M., Saudi M.F., Marhusin Cloud computing Genetic algorithm Intrusions detection Worms An innovative breakthrough in computer science is cloud computing and involves several computers which are connected via the Internet or it is dispersed over a network. A large database, services, applications, software and resources are an integral part of this technology. It has the capability to operate a program or applications on numerous connected computers simultaneously and permits the users to enter applications and resources through a web browser or web service via the Internet anytime and anywhere. Current susceptibility in elementary technologies gravitates to expose doors for intrusions. Cloud computing offers enormous advantages such as cost reduction, dynamic virtualized resources, significant data storage and enhanced productivity. At the same time, numerous risks occur regarding security and intrusions, for example, worm can intercept cloud computing services, impair service, application or virtual in the cloud formation. Worm attacks are now more complex and resourceful making intruders more difficult to detect than previously. The motivation of this research is founded on ramifications presented bythe worms. This paper presents different intrusion detection systems affecting cloud resources and service. Moreover, this paper illustrates how genetic algorithm can be integrated in detecting worm attacks in cloud computing more efficiently. 2015-06-25T06:45:15Z 2015-06-25T06:45:15Z 2015 Article 1819-6608 http://ddms.usim.edu.my/handle/123456789/8502 http://www.arpnjournals.com/jeas/research_papers/rp_2015/jeas_0215_1488.pdf en_US Asian Research Publishing Network
institution Universiti Sains Islam Malaysia
building USIM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universit Sains Islam i Malaysia
content_source USIM Institutional Repository
url_provider http://ddms.usim.edu.my/
language en_US
topic Cloud computing
Genetic algorithm
Intrusions detection
Worms
spellingShingle Cloud computing
Genetic algorithm
Intrusions detection
Worms
H.M., Kanaker
M.M., Saudi
M.F., Marhusin
A systematic analysis on worm detection in cloud based systems
description An innovative breakthrough in computer science is cloud computing and involves several computers which are connected via the Internet or it is dispersed over a network. A large database, services, applications, software and resources are an integral part of this technology. It has the capability to operate a program or applications on numerous connected computers simultaneously and permits the users to enter applications and resources through a web browser or web service via the Internet anytime and anywhere. Current susceptibility in elementary technologies gravitates to expose doors for intrusions. Cloud computing offers enormous advantages such as cost reduction, dynamic virtualized resources, significant data storage and enhanced productivity. At the same time, numerous risks occur regarding security and intrusions, for example, worm can intercept cloud computing services, impair service, application or virtual in the cloud formation. Worm attacks are now more complex and resourceful making intruders more difficult to detect than previously. The motivation of this research is founded on ramifications presented bythe worms. This paper presents different intrusion detection systems affecting cloud resources and service. Moreover, this paper illustrates how genetic algorithm can be integrated in detecting worm attacks in cloud computing more efficiently.
format Article
author H.M., Kanaker
M.M., Saudi
M.F., Marhusin
author_facet H.M., Kanaker
M.M., Saudi
M.F., Marhusin
author_sort H.M., Kanaker
title A systematic analysis on worm detection in cloud based systems
title_short A systematic analysis on worm detection in cloud based systems
title_full A systematic analysis on worm detection in cloud based systems
title_fullStr A systematic analysis on worm detection in cloud based systems
title_full_unstemmed A systematic analysis on worm detection in cloud based systems
title_sort systematic analysis on worm detection in cloud based systems
publisher Asian Research Publishing Network
publishDate 2015
url http://ddms.usim.edu.my/handle/123456789/8502
http://www.arpnjournals.com/jeas/research_papers/rp_2015/jeas_0215_1488.pdf
_version_ 1645152429632651264
score 13.214268