A Survey Over the Various Malware Detection Techniques used in Cloud Computing

  • Nancy
  • Dr. Sanjay Silakari
  • et al.
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

Cloud computing provides various on demand services to the user. These services provide a flexible and easy mechanism to access various web applications. But in cloud computing services like infrastructure as a service, platform as a service and many more are provided to the user. But various malicious attacks can be occurs in these process, a review over the various techniques like malware detection in virtualization, system call hashing, external host monitoring etc., which used for malware detection is presented in this paper, which provides a brief overview on the techniques used for malware detection in cloud computing.

Cite

CITATION STYLE

APA

Nancy, Dr. Sanjay Silakari, & Uday Chourasia. (2016). A Survey Over the Various Malware Detection Techniques used in Cloud Computing. International Journal of Engineering Research And, V5(02). https://doi.org/10.17577/ijertv5is020388

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free