Loading

An Analysis of User-oriented Behaviour-based Malware Variants Detection System
S. Varshavardhini1, R.A. Karthika2, K.M. Monica3
1S.Varshavardhini, PG Graduate, Department of Computer Science and Engineering, Vels Institute of Science, Technology & Advanced Studies VISTAS, Chennai (Tamil Nadu), India.
2R.A. Karthika, Associate Professor, Department of Computer Science and Engineering, Vels Institute of Science, Technology & Advanced Studies VISTAS, Chennai (Tamil Nadu), India.
3K.M. Monica, Assistant Professor, Department of Computer Science and Engineering, Vels Institute of Science, Technology & Advanced Studies VISTAS, Chennai (Tamil Nadu), India.
Manuscript received on 25 May 2019 | Revised Manuscript received on 03 June 2019 | Manuscript Published on 22 June 2019 | PP: 31-34 | Volume-8 Issue-3S, February 2019 | Retrieval Number: C10070283S19/19©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: A virtualized infrastructure (VI) is implemented through one or more virtual machines that depend on built-in software defined multiple instances of hosting hardware. This infrastructure model added an advantage of gathering different computing resources and on-demand resource scaling that facilitated extensive deployment of VI to cloud computing services. BDSA finds the potential attack and protect in VI opposing vulnerabilities. HDFS is used to store the backend information. Security analytical algorithm applied on logs captured at various points within network to identify the attach existence. Ref[1]Graph based event correlation and Map Reduce Parser methodologies are used to identify the attack paths through the network logs obtained. Ref [1] Two step machine learning is used to determine the attack presence, attack’s conditional probability based on attributes is calculated through logistic regression and existence of attack on network is calculated through belief propagation. This has steered way for cyber attackers to launch attacks for illegal access on virtualized infrastructures.
Keywords: Virtualized Infrastructure, Malware Detection, BDSA Approach, HDFS.
Scope of the Article: Predictive Analysis