Skip to main content

A New Methodology Based on Cloud Computing for Efficient Virus Detection

  • Conference paper
  • First Online:
New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 312))

Abstract

Antivirus software programs use specific techniques to detect computer viruses, malware and other network threats. The basic, most common and oldest antivirus detection technique is “virus signature scanning”, whereby antivirus programs use unique byte sequences for each virus so as to identify potential presence of malicious code in each file investigation procedure. Despite its advantages, this technique has many weaknesses that are highlighted in this paper. In lieu, this paper proposes a new hybrid security model for optimized protection and better virus detection, which merges the “Sandboxing Method”, “System-Changes-based Signatures” and “Cloud Computing”.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Alisa Shevchenko, “Malicious Code Detection Technologies”, Kaspersky Lab, 2008.

    Google Scholar 

  2. Neamtu Iosif Mircea, “Software Tools to Detect Files”, Dept. Of Informatics, Faculty of Science, Lucian Blaga University of Sibiu, Sibiu, 2011.

    Google Scholar 

  3. Ionut Ilascu, “The Insides of Panda Cloud Antivirus”, May 2009.

    Google Scholar 

  4. P. Szor, “The Art of Computer Virus Research and Defense”, Addison-Wesley Professional, Boston, MA (2005).

    Google Scholar 

  5. E. Filiol, “Computer Viruses: from theory to applications”, Springer-Verlag France 2005.

    Google Scholar 

  6. Essam Al Daoud, Iqbal H. Jebril and Belal Zaqaibeh, “Computer Virus Strategies and Detection Methods”, Int. J. Open Problems Compt. Math., Vol. 1, No. 2, September 2008.

    Google Scholar 

  7. In Seon Yoo and Ulrich Ultes-Nitsche, Non-signature based virus detection Towards establishing a unknown virus detection technique using SOM , Journal in Computer Virology, 2006, Volume 2, Number 3, Pages 163-186.

    Google Scholar 

  8. Min Feng and Rajiv Gupta, “Detecting Virus Mutations Via Dynamic Matching”, CSE Dept., University of California, Riverside, IEEE International Conference on Software Maintenance, September 2009.

    Google Scholar 

  9. Madhu K. Shankarapani, Subbu Ramamoorthy, Ram S. Movva, Srinivas Mukkamala, “Malware detection using assembly and API call sequences”, Journal in Computer Virology, Vol. 7, Issue 2, pp 107-119, May 2011.

    Google Scholar 

  10. Sunita Kanaujiya, Dr. S. P. Tripathi, N. C. Sharma, “Improving Speed of the Signature Scanner using BMH Algorithm”, Vol. 11, No. 4, International Journal of Computer Applications (0975-8887), December 2010.

    Google Scholar 

  11. Umakant Mishra, “Overcoming limitations of Signature scanning – Applying TRIZ to Improve Anti-Virus Programs”, TRIZsite Journal, April 2007.

    Google Scholar 

  12. Babak Bashari Rad, Maslin Masrom and Suhaimi Ibrahim, “Evolution of Computer Virus Concealment and Anti-Virus Techniques: A Short Survey”, IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 1, January 2011.

    Google Scholar 

  13. Liam Tung, “Anti-virus can’t keep up with threat onslaught”, April 2012.

    Google Scholar 

  14. Umakant Mishra,”Eliminating False Positives in Virus Scanning”, Bangalore, India, 2013.

    Google Scholar 

  15. Randy Abrams, “Understanding Heuristics”, AVAR Conference, Seoul, 2007.

    Google Scholar 

  16. Margaret Rouse, “Stealth Virus”, SearchSecurity TechTarget, September 2005.

    Google Scholar 

  17. Bertrand Anckaert, Matias Madou, Koen De Bosschere, “A Model for Self-Modifying Code”, Electronics and Information Systems Dept, Ghent University, Ghent, 2006.

    Google Scholar 

  18. Carey Nachenberg, “Computer Virus-Coevolution”, Communications of the ACM, Vol. 40, No. 1, January 1997.

    Google Scholar 

  19. Evgenios Konstantinou, Stefen Wolthusen, “Metamorphic Virus: Analysis and Detection”, University of London, TechTarget, 2008.

    Google Scholar 

  20. Sam Rash, Dan Gusfield, “String Barcoding – Uncovering Optimal Virus Signatures”, University of California, Davis, 2002.

    Google Scholar 

  21. Stephanie Crawford, “How a Cloud Antivirus Works”, Computer HowStuffWorks, 2013.

    Google Scholar 

Download references

Acknowledgement

This work was supported in part by the Research Committee of the University of Macedonia, Greece, under grant 80749 for the advance of Basic Research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Vasileios A. Memos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Memos, V.A., Psannis, K.E. (2015). A New Methodology Based on Cloud Computing for Efficient Virus Detection. In: Elleithy, K., Sobh, T. (eds) New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering. Lecture Notes in Electrical Engineering, vol 312. Springer, Cham. https://doi.org/10.1007/978-3-319-06764-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-06764-3_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-06763-6

  • Online ISBN: 978-3-319-06764-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics