Automatic Discovery of Malware Signature for Anti-Virus Cloud Computing

Article Preview

Abstract:

In this paper, a novel Automatic Malware Signature Discovery System for AV cloud is proposed to generate malware signatures from both static and dynamic aspects. It keeps a good workload balance between the desktop and cloud services. It can automatically generate a lightweight signature database with the size hundreds times smaller than traditional signature ones. In the AV cloud model, users do not need to install a large virus signature file, but a lightweight set of cloud signatures. The benefits include easy deployment, low costs of operation, and fast signature updating. Further, Automatic Malware Signature Discovery System signatures can be easily integrated into existing AV products.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 846-847)

Pages:

1640-1643

Citation:

Online since:

November 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Adobe Systems Incorporated. Apsb07-18: Adobe reader and acrobat vulnerability. http: /www. adobe. com/support/security/bulletins/apsb07-18. html, (2007).

Google Scholar

[2] Algirdas Avizienis. The n-version approach to fault-tolerant software. IEEE Transactions on Software Engineering, (1985).

DOI: 10.1109/tse.1985.231893

Google Scholar

[3] Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freiling. The nepenthes platform: An efficient approach to collect malware. In 9th International Symposium On Recent Advances In Intrusion Detection. Springer-Verlag, (2006).

DOI: 10.1007/11856214_9

Google Scholar

[4] Josh Ballard. An Eye on the Storm: Inside the Storm Epidemic. 41st Meeting of the North Americian Network Operators Group, October (2007).

Google Scholar

[5] Barracuda Networks. Barracuda spam firewall. http: /www. barracudanetworks. com, (2007).

Google Scholar

[6] C. Grace, Understanding intrusion detection systems, PC Network Advisor, vol. 122, pp.11-15, (2000).

Google Scholar

[7] W. Yan, Z. Zhang, and N. Ansari Revealing packed malware, Journal of IEEE Security and Privacy, vol. 6, no. 5, pp.65-69, Sep/Oct, (2008).

DOI: 10.1109/msp.2008.126

Google Scholar

[8] An In-Depth Look into the Win32 Portable Executable File Format, http: /msdn. microsoft. com/msdnmag/issues/02/02/PE.

Google Scholar