SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 182 
DETECT AND IMMUNE MOBILE CLOUD INFRASTRUCTURE A.Malathy1, J.Gayathri2, T.A.Vijayalakshmi3, M.Ramkumar4 1PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 2PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 3PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 4Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu Abstract Mobile devices with cloud based service are highly effective and they are very flexible and adaptable. Mobile cloud infrastructure is a new concept where mobile devices and cloud services are clubbed together. As it a commodity, service providers should know the security issues. In this paper various security threats are widely discussed based on situation. A new methodology is proposed in order to detect the abnormal behavior. By detect the host and the communication channel certain malicious programs are injected in the test bed in order to identify the abnormal behavior. Using machine learning algorithm, these suspicious programs are detected. To find the next neighboring node and to detect the fault, FDMC algorithm is implemented. Keywords: Fault Detection, Virtual Mobile Instances Signature based. 
--------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Different mobile services are provided as application to electronic gadgets like smart phones, tables and cloud based mobile services benefit users by providing enormous flexibility and wealthy communication. Data can be retrieved, processed and send at any time using mobile devices. Flexibility is there when mobile devices are accessed using cloud computing. Each virtual instance is denoted by a mobile device and users can connect and make use of it. Virtualization in mobile devices in cloud platform provides virtual instances to the mobile users. Virtual cloud infrastructure gives the virtual mobile instances. These instances are managed using extensive power and storage capacity. Virtual smartphone over IP is a classic example of virtual mobile instances. The threatening thing for the service provider is the security. Even through signature based preventive algorithms are used in the virtual mobile instances, in order to find the malicious and suspicious applications, which basically run on the mobile cloud environment in the mobile cloud infrastructure certain malicious programs are injected which actually spreads the entire cloud and affects the commuting devices as well. Using FDMC algorithm to find the next neighboring node and detect the fault. Certain signature based vaccine are injected in the cloud in order to keep trace the malfunctions in the cloud instances. By monitoring the data, suspicious behavior can be detected using the machine learning algorithm. In order to validate these methodologies a test bed is created which is basically a platform to test large projects. In this paper the entire concept is classified in to different section. 
 Detecting the suspicious behavior in the cloud infrastructure. 
 Security aspects and the possible situations of attacks 
 Monitoring the architecture of the cloud infrastructure. 
 Correct validation for the proposed architecture. 
 Monitoring metrics needs to be configured for providing services and charging the users 
1.1 Cloud Services based on Certain Situations Based on the virtualization concept certain malicious mobile applications are allowed to execute in the virtual mobile instances and if any program attacks the cloud, it leads to major problem. This paper focuses on the abnormal behavior in the cloud infrastructure Continuous monitoring is essential in order to find the malfunction in the cloud. So monitoring architecture is created to check both host and the data network flow. Using machine learning algorithm the unusual behavior is detected by implementing in the test bed environment. 1.2 Mobile Devices as a part of Cloud Construct Mobile computing assigns different roles to mobile devices. Assigning the cloud through mobile devices is generally termed as mobile computing. Different mobile devices form a cloud group and various jobs are delegated to different mobile devices to perform the job faster in the cloud computing infrastructure. 
Users may execute mobile application on demand services based on their needs. So the service providers also get benefited and obtain more profit. Perhaps this would have been better if the services are free of malware. So monitoring the entire host and entire data is a feasible host.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 183 
Machine learning techniques and monitoring real time traffic is a solution. 
Fig 1: Mobile instances vs. mobile cloud 2. Detecting the Suspicious Behavior Behavior determines what application runs on the mobile cloud infrastructure. Application creates flow between internal or external. These actions reflect the value of virtual resources. If any unexpected changes happen, the mobile instances intimate the cloud infrastructure and the user through alarm. Using signaled base method malware are detected with high accuracy and short duration. This generally detects the existing malware but couldn’t able to identify the newly injected malware. Vaccine application cannot detect the new malware. Cloud infrastructure connects the number of virtual instances when the malware is accepted. It sends to the entire cloud infrastructure. In order to resolve this problem host data are detected in the virtual instance and network are detected in the cloud infrastructure. There are two types of mobile cloud contacts creation and non-creation. Creation contacts directly with the mobile users and non-creation contacts by manipulating the background jobs. 2.1 Role of Hypervisor A hypervisor is a software program which runs the virtual machines. Once the hypervisor is installed on the physical device, it splits the nodes into right and non-rights. Virtual instances executes in non-right platforms. In order to monitor, the virtual instance, there is a bridge applications installed in the virtual mobile instance. This agent based programs supervises 
2.2 Types of Mobile Users 
Individual Users: Users are classified into three categories normal users, advanced users and developers based on their requirements. 
Normal Users: Users are interested in gaming services provided by cloud providers and they access cloud through 3G/4G or Wi-Fi. Advanced users: Users from private organization may use cloud for their office work. They access cloud services via office Wi-Fi or 3G/4G for simulation work. Developers: Frequent changes in cloud are necessary for developers; they may use all kind of services provided by cloud. Office Workers: We categorize office workers as staff in a main office, Staff in branches and agents based on the information they used. 
Fig 2: Types of cloud users Staff in a Main Office: Mobile office system is installed in the main office which can be used by the employees. Staff in Branch Offices: User needs to have a static mobile environment where they can access system from the branch office to the head office. Agents: People work with the company to develop a project may use mobile office system. 3. IMPLEMENTING SECURITY ON MOBILE PRIVATE CLOUD Most of the company wants to have a control over the mobile devices when it is provided by the company or by BYOD (Bring your own device). Mobile Device Management (MDM) with rigid deployment, and stable visibility and control that spans in mobile devices, real documents and the application. Actually this MDM supports all the latest mobile devices including apple iPhone, blackberry, kindle fire, windows phone.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 184 
3.1 Security Aspects and the Possible Situations of Attacks Using the machine learning algorithm, certain features are extracted from the hardware devices like CPU, network utilization, memory were all monitored and malwares are detected using the mobile application .It determines the behavior of the mobile devices while surfing the internet, texting ,making calls and can able to detect the behavior of the device. 3.2 Fault Detection in Mobile Cloud It tracks the performance of the machine and raises an alarm to found the fault. FDMC is faster than brute-force algorithm. In cloud infrastructure one machine is to play a vital role in mobile cloud called Monitor. Entities are E1, E2,…….En. Each machine can have the own data partition Ii , test points are sent by P0 it read from the disk. At any moment of time P0, maintain a current list of t, observation time Ok found. Initially OK is empty the new Observation time is updated and receive from the entity E1, E2,…….En. The monitor to maintain the cut-off threshold C it initially set to infinitive and sequentially increase the value. Once OK changes, it set to the least value in OK and sends it to the entire machine in the cloud. In the CHECK mode to test the block of data read from the memory based on local dataset it trim the points when the current threshold Ci is less than it send the test point to next machine in the ring. The machine Pi maintain threshold Ci it has receive from the monitor P0. Algorithm: CHECK () Procedure CHECK () Begin For all blocks of data in Ii do 
c getNextBlock(Ii); 
For all points bB do 
Nk(b) ⍉ 
For all points xIi do 
For bB, b≠x do If rb < ci then remove b from B 
For bB do Send (b, Nk(b),rb)to machine Pi+1 3.3 Unusual Behavior in Cloud Infrastructure There is lots of interruption for cloud services. The proposed design can find the anonymous or malicious behavior in the cloud infrastructure. The interruption detection system (IDS) manages the problems in the host interruption detection system (HIDS) and network Interruption detection system. This study doesn’t provide how the malicious program is detected. This architecture doesn’t display virtualization of each node, but it has the impact in the performance of cloud computing. 
Mobile Cloud Computing Group 
Number of mobile devices is combined to form a cloud computing group where a larger task is delegated to different mobile devices to make the job done in a shorter period of time and combination of mobile atmosphere. 
3.4 Enrolling Mobile Devices Just by selecting the MDM services and by configuring the device, the particular devices get enrolled. The enrollments request can be obtained using various means (i.e.) by email communication or by SMS or by a custom universal resource locator Authentication should be provided based on the service provided and the employee designation. By leveraging the existing authentication the services can integrated with the enterprise system .Mobile apps expose lots of personal information. 
 Securing mobile devices 
 By introducing the passcode policies, certain level of security can be reached 
 By strongly enforcing the encryption standards 
 Identifying the rooted devices 
 Stolen devices should be locked so that unauthorized access can be prevented 
Geo-Fencing is a software program which allows system admin to induce a program whenever there is enter or exit condition of the boundaries which is determined by administrator, an automatic intimation or alert is sent. So the company admin can set up boundaries and whenever the mobile is beyond the boundaries, he can disable the device, which is in the private cloud environment. Evaluation – Gathering behavior data: Test bed is implemented to validate the methodology and architecture. Xen hypervisor is installed on each physical node. Virtual images are created are created using the kernel .Linux gingerbread 2.36 is used and port is mirrored for each physical node. 4. CONCLUSIONS In the virtual cloud instance abnormal behaviors can be detected using signature based algorithm along with FDMC algorithm so that it finds the nearest neighboring node. Hence all the mobile devices can be checked whether it is affected by malicious program in the cloud. REFERENCES [1]. Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, and James Won-Ki Hong, “ Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure” 2012 IEEE/IFIP 3rd Workshop on Cloud Management (CloudMan) [2]. Kanishka Bhaduri, Kamalika Das, Bryan L. Matthews “Detecting Abnormal Machine Characteristics in Cloud Infrastructures”
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 185 
[3]. E. Y. Chen and M. Itoh, "Virtual Smartphone over IP", The next IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montrreal, Canada, June 2010, pp.1-6. [4]. F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges", IDC eXchange(http://blogs.idc.com/ie/), August 14, 2008. BIOGRAPHIES 
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes Mobile computing and cloud computing 
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes wireless sensor network and cloud computing. 
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes cloud computing, big data and mobile cloud.

Contenu connexe

Tendances

A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionIJERA Editor
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...Dr. Amarjeet Singh
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET Journal
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...IRJET Journal
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Vineet Garg
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR CodeIRJET Journal
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and GeocoderIRJET Journal
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningCSCJournals
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationApurva Kini
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile applicationAlexander Decker
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle PatternsIRJET Journal
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voiceeSAT Publishing House
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewjournalBEEI
 

Tendances (15)

A Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face DetectionA Survey on Security for Server Using Spontaneous Face Detection
A Survey on Security for Server Using Spontaneous Face Detection
 
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
 
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for SmartphonesComparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
 
IRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless BiometricIRJET - Door Lock Control using Wireless Biometric
IRJET - Door Lock Control using Wireless Biometric
 
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...IRJET-  	  Improving Employee Tracking and Monitoring System using Advanced M...
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
 
Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...Use biometrics for identity management of cloud users to enhanced the securit...
Use biometrics for identity management of cloud users to enhanced the securit...
 
IRJET - Image Watermarking using QR Code
IRJET -  	  Image Watermarking using QR CodeIRJET -  	  Image Watermarking using QR Code
IRJET - Image Watermarking using QR Code
 
IRJET- Women Safety Application using Firebase and Geocoder
IRJET-  	  Women Safety Application using Firebase and GeocoderIRJET-  	  Women Safety Application using Firebase and Geocoder
IRJET- Women Safety Application using Firebase and Geocoder
 
IoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine LearningIoT Network Attack Detection using Supervised Machine Learning
IoT Network Attack Detection using Supervised Machine Learning
 
I018145157
I018145157I018145157
I018145157
 
Securing Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint AuthenticationSecuring Mobile Cloud Using Fingerprint Authentication
Securing Mobile Cloud Using Fingerprint Authentication
 
Remote surveillance system for mobile application
Remote surveillance system for mobile applicationRemote surveillance system for mobile application
Remote surveillance system for mobile application
 
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET -  	  Contactless Biometric Security System using Finger Knuckle PatternsIRJET -  	  Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
 
Improved authentication using arduino based voice
Improved authentication using arduino based voiceImproved authentication using arduino based voice
Improved authentication using arduino based voice
 
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a reviewMalware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
 

En vedette

Comparison of friction stirs welding technique with conventional welding methods
Comparison of friction stirs welding technique with conventional welding methodsComparison of friction stirs welding technique with conventional welding methods
Comparison of friction stirs welding technique with conventional welding methodseSAT Publishing House
 
An experimental investigation into the performance
An experimental investigation into the performanceAn experimental investigation into the performance
An experimental investigation into the performanceeSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11eSAT Publishing House
 
Fpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converterFpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp convertereSAT Publishing House
 
Experimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acidExperimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acideSAT Publishing House
 
Night image enhancement using fusion technique
Night image enhancement using fusion techniqueNight image enhancement using fusion technique
Night image enhancement using fusion techniqueeSAT Publishing House
 
Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...eSAT Publishing House
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Survey methodology and geometrical analysis of late
Survey methodology and geometrical analysis of lateSurvey methodology and geometrical analysis of late
Survey methodology and geometrical analysis of lateeSAT Publishing House
 
Managing drought short term strategies in semi arid
Managing drought short term strategies in semi aridManaging drought short term strategies in semi arid
Managing drought short term strategies in semi arideSAT Publishing House
 
A survey on nuclear to-cytoplasmic ratio analysis
A survey on nuclear to-cytoplasmic ratio analysisA survey on nuclear to-cytoplasmic ratio analysis
A survey on nuclear to-cytoplasmic ratio analysiseSAT Publishing House
 
Transition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresisTransition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresiseSAT Publishing House
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlabeSAT Publishing House
 
Image processing techniques applied for pitting
Image processing techniques applied for pittingImage processing techniques applied for pitting
Image processing techniques applied for pittingeSAT Publishing House
 
System of quasilinear equations of reaction diffusion
System of quasilinear equations of reaction diffusionSystem of quasilinear equations of reaction diffusion
System of quasilinear equations of reaction diffusioneSAT Publishing House
 
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...eSAT Publishing House
 
Design of dual master i2 c bus controller
Design of dual master i2 c bus controllerDesign of dual master i2 c bus controller
Design of dual master i2 c bus controllereSAT Publishing House
 
Performance of high power light emitting diode for
Performance of high power light emitting diode forPerformance of high power light emitting diode for
Performance of high power light emitting diode foreSAT Publishing House
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption ineSAT Publishing House
 

En vedette (20)

Comparison of friction stirs welding technique with conventional welding methods
Comparison of friction stirs welding technique with conventional welding methodsComparison of friction stirs welding technique with conventional welding methods
Comparison of friction stirs welding technique with conventional welding methods
 
An experimental investigation into the performance
An experimental investigation into the performanceAn experimental investigation into the performance
An experimental investigation into the performance
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 
Fpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converterFpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converter
 
Experimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acidExperimental investigation of chemical etching on en 5 steel using nitric acid
Experimental investigation of chemical etching on en 5 steel using nitric acid
 
Night image enhancement using fusion technique
Night image enhancement using fusion techniqueNight image enhancement using fusion technique
Night image enhancement using fusion technique
 
Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...Performance improvement of energy aware and adaptive routing protocols for ma...
Performance improvement of energy aware and adaptive routing protocols for ma...
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Survey methodology and geometrical analysis of late
Survey methodology and geometrical analysis of lateSurvey methodology and geometrical analysis of late
Survey methodology and geometrical analysis of late
 
Managing drought short term strategies in semi arid
Managing drought short term strategies in semi aridManaging drought short term strategies in semi arid
Managing drought short term strategies in semi arid
 
A survey on nuclear to-cytoplasmic ratio analysis
A survey on nuclear to-cytoplasmic ratio analysisA survey on nuclear to-cytoplasmic ratio analysis
A survey on nuclear to-cytoplasmic ratio analysis
 
Transition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresisTransition for regular to mach reflection hysteresis
Transition for regular to mach reflection hysteresis
 
Speech compression analysis using matlab
Speech compression analysis using matlabSpeech compression analysis using matlab
Speech compression analysis using matlab
 
Image processing techniques applied for pitting
Image processing techniques applied for pittingImage processing techniques applied for pitting
Image processing techniques applied for pitting
 
System of quasilinear equations of reaction diffusion
System of quasilinear equations of reaction diffusionSystem of quasilinear equations of reaction diffusion
System of quasilinear equations of reaction diffusion
 
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
 
Design of dual master i2 c bus controller
Design of dual master i2 c bus controllerDesign of dual master i2 c bus controller
Design of dual master i2 c bus controller
 
Performance of high power light emitting diode for
Performance of high power light emitting diode forPerformance of high power light emitting diode for
Performance of high power light emitting diode for
 
A study on security responsibilities and adoption in
A study on security responsibilities and adoption inA study on security responsibilities and adoption in
A study on security responsibilities and adoption in
 

Similaire à Detect and immune mobile cloud infrastructure

IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET Journal
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesEswar Publications
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationIJNSA Journal
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksAhmad Sharifi
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSEditor IJCATR
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...eSAT Publishing House
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...ijcncs
 
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICVIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICijcsit
 
Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Swapnali Pawar
 
Analysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilerAnalysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilereSAT Journals
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromeSAT Publishing House
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...eSAT Publishing House
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET Journal
 

Similaire à Detect and immune mobile cloud infrastructure (20)

IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
 
A Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research ChallengesA Survey of Cyber foraging systems: Open Issues, Research Challenges
A Survey of Cyber foraging systems: Open Issues, Research Challenges
 
Fog computing
Fog computingFog computing
Fog computing
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print AuthenticationSecuring Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
 
Security Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing NetworksSecurity Attacks And Solutions On Ubiquitous Computing Networks
Security Attacks And Solutions On Ubiquitous Computing Networks
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Smartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMSSmartphone Remote Detection and Wipe System using SMS
Smartphone Remote Detection and Wipe System using SMS
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
 
A017360104
A017360104A017360104
A017360104
 
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROLAPPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
 
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTICVIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
 
Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1Unit 2.design computing architecture 2.1
Unit 2.design computing architecture 2.1
 
Analysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compilerAnalysis and reporting of programming skills using mobile cloud based compiler
Analysis and reporting of programming skills using mobile cloud based compiler
 
An enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents fromAn enhanced approach for securing mobile agents from
An enhanced approach for securing mobile agents from
 
Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...Secure intrusion detection and countermeasure selection in virtual system usi...
Secure intrusion detection and countermeasure selection in virtual system usi...
 
Smart surveillance using deep learning
Smart surveillance using deep learningSmart surveillance using deep learning
Smart surveillance using deep learning
 
20120130406025
2012013040602520120130406025
20120130406025
 
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...IRJET-  	  Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
 

Plus de eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housingeSAT Publishing House
 

Plus de eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 
Disaster recovery sustainable housing
Disaster recovery sustainable housingDisaster recovery sustainable housing
Disaster recovery sustainable housing
 

Dernier

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Dernier (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 

Detect and immune mobile cloud infrastructure

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 182 DETECT AND IMMUNE MOBILE CLOUD INFRASTRUCTURE A.Malathy1, J.Gayathri2, T.A.Vijayalakshmi3, M.Ramkumar4 1PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 2PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 3PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 4Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu Abstract Mobile devices with cloud based service are highly effective and they are very flexible and adaptable. Mobile cloud infrastructure is a new concept where mobile devices and cloud services are clubbed together. As it a commodity, service providers should know the security issues. In this paper various security threats are widely discussed based on situation. A new methodology is proposed in order to detect the abnormal behavior. By detect the host and the communication channel certain malicious programs are injected in the test bed in order to identify the abnormal behavior. Using machine learning algorithm, these suspicious programs are detected. To find the next neighboring node and to detect the fault, FDMC algorithm is implemented. Keywords: Fault Detection, Virtual Mobile Instances Signature based. --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Different mobile services are provided as application to electronic gadgets like smart phones, tables and cloud based mobile services benefit users by providing enormous flexibility and wealthy communication. Data can be retrieved, processed and send at any time using mobile devices. Flexibility is there when mobile devices are accessed using cloud computing. Each virtual instance is denoted by a mobile device and users can connect and make use of it. Virtualization in mobile devices in cloud platform provides virtual instances to the mobile users. Virtual cloud infrastructure gives the virtual mobile instances. These instances are managed using extensive power and storage capacity. Virtual smartphone over IP is a classic example of virtual mobile instances. The threatening thing for the service provider is the security. Even through signature based preventive algorithms are used in the virtual mobile instances, in order to find the malicious and suspicious applications, which basically run on the mobile cloud environment in the mobile cloud infrastructure certain malicious programs are injected which actually spreads the entire cloud and affects the commuting devices as well. Using FDMC algorithm to find the next neighboring node and detect the fault. Certain signature based vaccine are injected in the cloud in order to keep trace the malfunctions in the cloud instances. By monitoring the data, suspicious behavior can be detected using the machine learning algorithm. In order to validate these methodologies a test bed is created which is basically a platform to test large projects. In this paper the entire concept is classified in to different section.  Detecting the suspicious behavior in the cloud infrastructure.  Security aspects and the possible situations of attacks  Monitoring the architecture of the cloud infrastructure.  Correct validation for the proposed architecture.  Monitoring metrics needs to be configured for providing services and charging the users 1.1 Cloud Services based on Certain Situations Based on the virtualization concept certain malicious mobile applications are allowed to execute in the virtual mobile instances and if any program attacks the cloud, it leads to major problem. This paper focuses on the abnormal behavior in the cloud infrastructure Continuous monitoring is essential in order to find the malfunction in the cloud. So monitoring architecture is created to check both host and the data network flow. Using machine learning algorithm the unusual behavior is detected by implementing in the test bed environment. 1.2 Mobile Devices as a part of Cloud Construct Mobile computing assigns different roles to mobile devices. Assigning the cloud through mobile devices is generally termed as mobile computing. Different mobile devices form a cloud group and various jobs are delegated to different mobile devices to perform the job faster in the cloud computing infrastructure. Users may execute mobile application on demand services based on their needs. So the service providers also get benefited and obtain more profit. Perhaps this would have been better if the services are free of malware. So monitoring the entire host and entire data is a feasible host.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 183 Machine learning techniques and monitoring real time traffic is a solution. Fig 1: Mobile instances vs. mobile cloud 2. Detecting the Suspicious Behavior Behavior determines what application runs on the mobile cloud infrastructure. Application creates flow between internal or external. These actions reflect the value of virtual resources. If any unexpected changes happen, the mobile instances intimate the cloud infrastructure and the user through alarm. Using signaled base method malware are detected with high accuracy and short duration. This generally detects the existing malware but couldn’t able to identify the newly injected malware. Vaccine application cannot detect the new malware. Cloud infrastructure connects the number of virtual instances when the malware is accepted. It sends to the entire cloud infrastructure. In order to resolve this problem host data are detected in the virtual instance and network are detected in the cloud infrastructure. There are two types of mobile cloud contacts creation and non-creation. Creation contacts directly with the mobile users and non-creation contacts by manipulating the background jobs. 2.1 Role of Hypervisor A hypervisor is a software program which runs the virtual machines. Once the hypervisor is installed on the physical device, it splits the nodes into right and non-rights. Virtual instances executes in non-right platforms. In order to monitor, the virtual instance, there is a bridge applications installed in the virtual mobile instance. This agent based programs supervises 2.2 Types of Mobile Users Individual Users: Users are classified into three categories normal users, advanced users and developers based on their requirements. Normal Users: Users are interested in gaming services provided by cloud providers and they access cloud through 3G/4G or Wi-Fi. Advanced users: Users from private organization may use cloud for their office work. They access cloud services via office Wi-Fi or 3G/4G for simulation work. Developers: Frequent changes in cloud are necessary for developers; they may use all kind of services provided by cloud. Office Workers: We categorize office workers as staff in a main office, Staff in branches and agents based on the information they used. Fig 2: Types of cloud users Staff in a Main Office: Mobile office system is installed in the main office which can be used by the employees. Staff in Branch Offices: User needs to have a static mobile environment where they can access system from the branch office to the head office. Agents: People work with the company to develop a project may use mobile office system. 3. IMPLEMENTING SECURITY ON MOBILE PRIVATE CLOUD Most of the company wants to have a control over the mobile devices when it is provided by the company or by BYOD (Bring your own device). Mobile Device Management (MDM) with rigid deployment, and stable visibility and control that spans in mobile devices, real documents and the application. Actually this MDM supports all the latest mobile devices including apple iPhone, blackberry, kindle fire, windows phone.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 184 3.1 Security Aspects and the Possible Situations of Attacks Using the machine learning algorithm, certain features are extracted from the hardware devices like CPU, network utilization, memory were all monitored and malwares are detected using the mobile application .It determines the behavior of the mobile devices while surfing the internet, texting ,making calls and can able to detect the behavior of the device. 3.2 Fault Detection in Mobile Cloud It tracks the performance of the machine and raises an alarm to found the fault. FDMC is faster than brute-force algorithm. In cloud infrastructure one machine is to play a vital role in mobile cloud called Monitor. Entities are E1, E2,…….En. Each machine can have the own data partition Ii , test points are sent by P0 it read from the disk. At any moment of time P0, maintain a current list of t, observation time Ok found. Initially OK is empty the new Observation time is updated and receive from the entity E1, E2,…….En. The monitor to maintain the cut-off threshold C it initially set to infinitive and sequentially increase the value. Once OK changes, it set to the least value in OK and sends it to the entire machine in the cloud. In the CHECK mode to test the block of data read from the memory based on local dataset it trim the points when the current threshold Ci is less than it send the test point to next machine in the ring. The machine Pi maintain threshold Ci it has receive from the monitor P0. Algorithm: CHECK () Procedure CHECK () Begin For all blocks of data in Ii do c getNextBlock(Ii); For all points bB do Nk(b) ⍉ For all points xIi do For bB, b≠x do If rb < ci then remove b from B For bB do Send (b, Nk(b),rb)to machine Pi+1 3.3 Unusual Behavior in Cloud Infrastructure There is lots of interruption for cloud services. The proposed design can find the anonymous or malicious behavior in the cloud infrastructure. The interruption detection system (IDS) manages the problems in the host interruption detection system (HIDS) and network Interruption detection system. This study doesn’t provide how the malicious program is detected. This architecture doesn’t display virtualization of each node, but it has the impact in the performance of cloud computing. Mobile Cloud Computing Group Number of mobile devices is combined to form a cloud computing group where a larger task is delegated to different mobile devices to make the job done in a shorter period of time and combination of mobile atmosphere. 3.4 Enrolling Mobile Devices Just by selecting the MDM services and by configuring the device, the particular devices get enrolled. The enrollments request can be obtained using various means (i.e.) by email communication or by SMS or by a custom universal resource locator Authentication should be provided based on the service provided and the employee designation. By leveraging the existing authentication the services can integrated with the enterprise system .Mobile apps expose lots of personal information.  Securing mobile devices  By introducing the passcode policies, certain level of security can be reached  By strongly enforcing the encryption standards  Identifying the rooted devices  Stolen devices should be locked so that unauthorized access can be prevented Geo-Fencing is a software program which allows system admin to induce a program whenever there is enter or exit condition of the boundaries which is determined by administrator, an automatic intimation or alert is sent. So the company admin can set up boundaries and whenever the mobile is beyond the boundaries, he can disable the device, which is in the private cloud environment. Evaluation – Gathering behavior data: Test bed is implemented to validate the methodology and architecture. Xen hypervisor is installed on each physical node. Virtual images are created are created using the kernel .Linux gingerbread 2.36 is used and port is mirrored for each physical node. 4. CONCLUSIONS In the virtual cloud instance abnormal behaviors can be detected using signature based algorithm along with FDMC algorithm so that it finds the nearest neighboring node. Hence all the mobile devices can be checked whether it is affected by malicious program in the cloud. REFERENCES [1]. Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, and James Won-Ki Hong, “ Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure” 2012 IEEE/IFIP 3rd Workshop on Cloud Management (CloudMan) [2]. Kanishka Bhaduri, Kamalika Das, Bryan L. Matthews “Detecting Abnormal Machine Characteristics in Cloud Infrastructures”
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 185 [3]. E. Y. Chen and M. Itoh, "Virtual Smartphone over IP", The next IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montrreal, Canada, June 2010, pp.1-6. [4]. F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges", IDC eXchange(http://blogs.idc.com/ie/), August 14, 2008. BIOGRAPHIES Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes Mobile computing and cloud computing Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes wireless sensor network and cloud computing. Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes cloud computing, big data and mobile cloud.