Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
In-cloud malware analysis and detection: state of the art
Alam S., Sogukpinar I., Traore I., Coady Y.  SIN 2014 (Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, UK, Sep 9-11, 2014)473-478.2014.Type:Proceedings
Date Reviewed: Jan 27 2015

Among the many “as a service” functions of the cloud, one of the least explored is the use of the cloud’s computational power to detect malware. This paper discusses the state of the art of this service. The survey analyzes only experimental approaches that provide a complete service, and describes the work of eight research groups that together offer a good picture of the research in this area. Only signature-based approaches are considered; as the authors indicate, behavioral detection techniques are now too difficult to perform in the cloud due to the inability of this environment to reproduce the actual execution environment of the malware.

The survey results in a list of the advantages of using clouds for this function, as well as the disadvantages. Among the advantages are the possibility of running multiple anti-malware engines, to add any number of detection engines, and ease of deployment. In particular, these advantages are significant for portable devices, which do not have large computational power. However, there are also significant disadvantages, such as an increase in false positives and detection time, and others.

To mitigate these problems, the authors propose an architecture that applies first a lightweight anti-malware engine (LWE), and if this fails to find malware, it applies several cloud-based engines to detect the possible malware. The authors intend to implement their idea and evaluate it experimentally; readers will have to wait until then to see how effective it is. The paper is clear and may interest researchers in malware detection.

Reviewer:  E. B. Fernandez Review #: CR143112 (1505-0410)
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
 
Distributed Applications (C.2.4 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy