Affiliation:
1. Thiagarajar College of Engineering, India
Abstract
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high-intelligent to gather the payload of zero-day polymorphic heterogeneous and homogeneous stages in distributed computing. The Signature-based discovery of worms strategies work with a low false-positive rate. We propose an irregularity based interruption location instrument for the cloud which specifically benefits from the virtualization advancements all in all. Our proposed abnormality location framework is detached from spreading computer worm contamination and it can recognize new computer worms. Utilizing our methodology, a spreading computer worm can be distinguished on the spreading conduct itself without getting to or straightforwardly affecting running virtual machines of the cloud.
Reference38 articles.
1. A view of cloud computing
2. An approach to a Cloud Computing network
3. Bobor, V. (2006). Efficient Intrusion Detection System Architecture Based on Neural Networks and Genetic Algorithms.
4. Artificial Neural Networks for Misuse Detection.;J.Cannady;National Information Systems Security Conference,2010
5. Adaptive neuro-fuzzy intrusion detection systems