Abstract
Antivirus software programs use specific techniques to detect computer viruses, malware and other network threats. The basic, most common and oldest antivirus detection technique is “virus signature scanning”, whereby antivirus programs use unique byte sequences for each virus so as to identify potential presence of malicious code in each file investigation procedure. Despite its advantages, this technique has many weaknesses that are highlighted in this paper. In lieu, this paper proposes a new hybrid security model for optimized protection and better virus detection, which merges the “Sandboxing Method”, “System-Changes-based Signatures” and “Cloud Computing”.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alisa Shevchenko, “Malicious Code Detection Technologies”, Kaspersky Lab, 2008.
Neamtu Iosif Mircea, “Software Tools to Detect Files”, Dept. Of Informatics, Faculty of Science, Lucian Blaga University of Sibiu, Sibiu, 2011.
Ionut Ilascu, “The Insides of Panda Cloud Antivirus”, May 2009.
P. Szor, “The Art of Computer Virus Research and Defense”, Addison-Wesley Professional, Boston, MA (2005).
E. Filiol, “Computer Viruses: from theory to applications”, Springer-Verlag France 2005.
Essam Al Daoud, Iqbal H. Jebril and Belal Zaqaibeh, “Computer Virus Strategies and Detection Methods”, Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008.
In Seon Yoo and Ulrich Ultes-Nitsche, “ Non-signature based virus detection Towards establishing a unknown virus detection technique using SOM “, Journal in Computer Virology, 2006, Volume 2, Number 3, Pages 163-186.
Min Feng and Rajiv Gupta, “Detecting Virus Mutations Via Dynamic Matching”, CSE Dept., University of California, Riverside, IEEE International Conference on Software Maintenance, September 2009.
Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala, “Malware detection using assembly and API call sequences”, Journal in Computer Virology, Vol. 7, Issue 2, pp 107-119, May 2011.
Sunita Kanaujiya, Dr. S. P. Tripathi, N. C. Sharma, “Improving Speed of the Signature Scanner using BMH Algorithm”, Vol. 11, No. 4, International Journal of Computer Applications (0975-8887), December 2010.
Umakant Mishra, “Overcoming limitations of Signature scanning – Applying TRIZ to Improve Anti-Virus Programs”, TRIZsite Journal, April 2007.
Babak Bashari Rad, Maslin Masrom and Suhaimi Ibrahim, “Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011.
Liam Tung, “Anti-virus can’t keep up with threat onslaught”, April 2012.
Umakant Mishra,”Eliminating False Positives in Virus Scanning”, Bangalore, India, 2013.
Randy Abrams, “Understanding Heuristics”, AVAR Conference, Seoul, 2007.
Margaret Rouse, “Stealth Virus”, SearchSecurity TechTarget, September 2005.
Bertrand Anckaert, Matias Madou, Koen De Bosschere, “A Model for Self-Modifying Code”, Electronics and Information Systems Dept, Ghent University, Ghent, 2006.
Carey Nachenberg, “Computer Virus-Coevolution”, Communications of the ACM, Vol. 40, No. 1, January 1997.
Evgenios Konstantinou, Stefen Wolthusen, “Metamorphic Virus: Analysis and Detection”, University of London, TechTarget, 2008.
Sam Rash, Dan Gusfield, “String Barcoding – Uncovering Optimal Virus Signatures”, University of California, Davis, 2002.
Stephanie Crawford, “How a Cloud Antivirus Works”, Computer HowStuffWorks, 2013.
Acknowledgement
This work was supported in part by the Research Committee of the University of Macedonia, Greece, under grant 80749 for the advance of Basic Research.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Memos, V.A., Psannis, K.E. (2015). A New Methodology Based on Cloud Computing for Efficient Virus Detection. In: Elleithy, K., Sobh, T. (eds) New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 312. Springer, Cham. https://doi.org/10.1007/978-3-319-06764-3_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-06764-3_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-06763-6
Online ISBN: 978-3-319-06764-3
eBook Packages: EngineeringEngineering (R0)