Professional Documents
Culture Documents
Abstract -- The innovation and growth in the usability of mobile There are many malware samples appears as Figure 2 [4]
phones is astonishing. There is the nightmare of getting a show the growth into the malware industry field from Q3 in
malware program through many applications and games 2016 to Q2 in the year of 2018.Security is of vital worry to
available on google play free. Therefore, users require some both Google and Apple. [5]
computational capacity to execute profoundly complex effective
algorithms for mobile intrusion detection discovery, which is
impossible to be available on mobile devices. Therefore, the need
for a powerful platform like cloud seems to be necessary to
protect the user from threats and several security issues. Cloud
computing has overwhelmed the world, as there are various
cloud-based intrusion detection Systems (IDS) that can enhance
Smartphones security and enhance the mobile performance.
In this review paper, a study of the terms related to mobile
malware techniques, classes and the techniques used for the
detection of malware by using different systems of cloud-based
intrusion detection is covered. In this research, applied proposed
methods and types of approach are highlighted.
Index Terms-- Malware techniques, Mobile cloud computing, Fig. 1. Threats targeting Google play in 2016.
Mobile malware detection, Intrusion Detection System.
I. INTRODUCTION
56 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 2
57 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 3
Table III. The summary of four basic measures for evaluation. V. MOBILE MALWARE DETECTION
Prediction
A. Malware Detection Techniques
Malicious Benign
In the mobile environment, there are two classifications:
Malicious TRUE FALSE Anomaly-Based Detection and Signature-Based Detection.
Reality NEGATIVE POSITIVE Figure 3. Indicates distinctive approaches, which go under
Benign FALSE TRUE these techniques. A particular analysis or approach of both the
NEGATIVE POSITIVE techniques is dictated by how specific techniques accumulate
data to recognize and detect malware.
58 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 4
59 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 5
parameters for recognizing malware. In addition, the dataset1 a true positive rate 90.72% and false positive rate
estimations of parameters incredibly affect detection reach to 9.27% otherwise on testing on dataset2 a true positive
performance. rate 85.05% and false positive rate reach to 4.94%.
Shuang et al. [22] Droid Detective, an android malware
2) Static techniques: Depend on the analysis of the detection system was proposed to enhance the Security of
detecting source code of exciting application to classifying mobile devices. It is offline tools, which depend on
accordingly without need to executing it. As it is a very fast permissions analysis combinations in order to detect any
and inexpensive techniques of detecting any bad code segment mobile malware. This tool developed by using K-maps
or malicious behave of any segment of code. algorithm. Droid Detective achieve false positive rate =
Those techniques are classified into classes according to what 12.47%, false negative rate= 16.43% and with positive rate =
technique is used for analyzing the source code in order to 87.53%.
detect any malicious code segment into target application. Xing Liu and Jiqiang Liu. [17] proposed a scheme by
This section divided the static detection methods into three extract several Permissions from .APK files: Requested
types. In each type the most current literature work that used Permissions, Request Permission Pairs, Used Permissions,
this specific technique are discussed. Used Permission Pairs. This schema TPR IS 80.5%, FPR 0.5%
and with accuracy 98,6%.
a) Signature based analysis Yerima et al. [12] a Genome Project data classifier for
android application by using Bayesian classifier based on
Min et al. [19] proposed an analytical system for android static code analysis. A feature extracted from .apk files like:
which can automatically identify malicious code segment, API calls, Linux system commands and permissions so as to
collect malware and generate signatures for applications.by results announced preferable discovery rates over signature-
using permission recursion technique and class association, based antivirus.
this analytical system success in detecting a Zero-day malware
which is a new malware that current anti-virus systems cannot c) Virtual machine analysis
detect. The system is being used to detect 2,475 malware
samples from 102 families, with 327 zero-day malware In mobile applications a virtual machine is needed to examine
samples belongs to six different families. the byte code of a particular application.by analyzing the byte
According to [7] a program classifies a malware if its code, there are a lot of aspects that can be examined like:
signature matched the exciting signatures that are available in application behavior, data flow of application and analysis
anti-virus program by extracting the semantic patterns and control. all of these functionalities are helpful into detecting
creates a unique signature. It considers a very fast method for malicious behavior performed by any type of malware apps.
detecting malware, however, it needs immediate update of The limitation of virtual machine is that analysis performed at
malware signature to keep up with the revolution in the the instruction level and consume from the storage and power
industry of malware. of the apps.
Halilovic et al. [20] proposed a system that access the log
file of user then compare it according to rule-sets. In case of DroidAPIMiner is presents by Y. Aafer et al. [8]as an
no matching item, normal action is done. Otherwise a new analytical virtual machine to examine android app through
malware signature is detected and there is system alarm. tracking the API calls.
Alam et al. [3] build signature-based model using a Random
Forest algorithm based on Weka, which provide a database 3) Dynamic techniques: depend on the analysis of the
contain samples of malicious features to work into it. Un detecting application during the it’s execution time in order to
fortunately the detection doesn’t support the real-time monitor dynamic behavior. This technique is done in runtime.
detection but the accuracy rate reach to 80%. This technique overcome the limitation of static analysis like
obfuscation. One of its advantages that there is a large scale
b) Permission based analysis for analysis regardless the static analysis. Those techniques are
classified into classes according to what techniques is used for
According to [6] permissions include the following analyzing the app. This section divided the static detection
requested and required permissions. But android permissions methods into three types: anomaly-based detection, taint
are classified into four types: signature, normal, dangerous and analysis detection, and emulation-based detection.
signature or system. So, in order to known the malicious In each type the most current literature work that used this
application, there is need to check weather an application specific technique are discussed.
requires a dangerous permission access or not.
Zarni Aung et al. [21] implement a framework, as K-Means
Clustering Algorithm is chosen to determine if the target a) Anomaly based analysis
application is malicious or normal application. In order to
develop this model, they have extracted various permission One of the most popular approach of the behavior-based
from several downloaded applications from android markets. detection is the anomaly-based detection, as Behavior based
This module has been evaluating by using the Area Under methods concentrate on the behavior of the system from
ROC Curve (AUC). This system achieves on testing on outside by executing it. If there is any malicious behavior after
60 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 6
observing the behavior of system, it can be identified as dynamic taint analysis without need for android system
malware. There are several types of behavior-based detection modification and use automatic tagging. This tool depends on
exists, depending on the way that the approach keeps tracking the data set of malwares. This approach using dynamic taint
of different parameters and the status of different components analysis. All leakage sensitive information like Call-Logs,
of the target device. Contacts, existing SMS, Email, SD-card contents and GPS
CrowDroid [8] is an anomaly-based detection tool, used for location co-ordinates identified as taint source then taint
malware detection in android mobiles by analyzing the system marking stars with help of automatic tagging. The statistics of
call’s logs in order to know the behavior of the target device AndroTaint is 90% (malicious Apps: 80%, benign Apps: 90%,
while AntiMalDroid depending on analyzing the behavior of aggressive Apps: 94% and 95% risky Apps: 95%). However,
system, then generate a signature of system’s malware both tools TaintDroid and AndroTaint explicit flow analysis
behavior. For IOS devices, there are popular anomaly-based without covering the control flow analysis.
detection tools like SMS Profiler and iDMA both of them
keep tracking of illegitimate usage of system services.
Radoglou et al. [23] proposed a lightweight IDS for c) Emulation based analysis
detecting malicious behavior for android devices which used a
very powerful multi-layer perception (MLP) neural network. According to [26], Mobile sandbox to test untrusted users,
This system consists of three components: information source, websites or third parties without risking harm to host machine
analysis engine, response. There is a machine learning or OS. This tool is a combination of static and dynamic
algorithm for detecting unknown threads with accuracy analysis. The static analysis used for APK file like user
reaches to 81, 39% and detection rate reaches to 85,02%. The permission and manifest.xml file to identify any malicious
main goal of system is to achieve very high rates of malicious code. Dynamic part used to check the network flow and native
behavior detection with small rates of false alarms. The calls to standing the behavior of the suspicious application.
detection in this system achieved by monitoring the Net On the other hand, there is DroidScope [8] is an emulation
Flows, then IDS, which has a strong Python backend tool used to dynamically analyzing the suspicion application
analyzing the network traffic, and matched it with (MLP) based on virtual machine. It is monitoring the system by being
neural network. If there is matching an alert is fired for out of execution environment.
detecting an intrusion.
Mohata et al. [3] introduced an anomaly-based system,
which consist of two stages: first constructs signatures for the 4) Comparison of mobile malware detection methods
API calls of target device then train a classifier using a support
vector machines (SVMs) in order to distinguish between a
malicious programs from benign program.
According to [20], a defensive program used to examine
files before user download it. First all information about file is
entered by user through a web service, then a string matching
and file information been processed by cloud server for
comparison. The detecting process performed in cloud service
for defining any intrusions.
Hua et al. [24] introduced a framework for an anomaly-
based intrusion detecting IDS to monitor all information about
android mobile devices then analysis all of it by a Naive Bayes
Algorithm to classify the collected data as normal or
malicious.
b) Taint analysis
61 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 7
# Ref IDS type Techniques Positioning Algorithms Evaluation Measure Type Pros & Cons
and Value
Min et al. HIDS Signature- On each - detect 2,475 malware success in detecting a Zero-day
[25] based host samples. malware but suffer from
recursion and repetition.
Guo et al. HIDS Signature- On each Naive Bayes accuracy rate reach to semantic patterns and creates a
[3] based host algorithms 80%. unique signature, but this
detection cause time
consumption.
Alam et HIDS Signature- On each Random accuracy rate reach to a new malware signature is
al. [27] based host Forest 80%. detected and there is system
algorithm alarm, but un- fortunately the
detection doesn’t support the
real-time detection.
Zarni HIDS Permission- On each K-Means This module achieves a This system determines if the
Aung et based host Clustering true positive rate 90.72% target application is malicious or
al. [21] Algorithm and false positive rate normal application, but doesn’t
reach to 9.27% on testing detect zero days malwares.
dataset1 otherwise on
testing on dataset2 a true
positive rate 85.05% and
false positive rate reach to
4.94%.
Shuang et HIDS Permission- On each K-maps false positive rate = It is offline tools which depend
al. [22] based host algorithm 12.47%,. on permissions analysis
false negative rate= combinations in order to detect
16.43% . any mobile malware, but doesn’t
positive rate = 87.53%. detect some types of zero days
malwares.
Xing Liu HIDS Permission- On each machine TPR = 80.5%,. detecting Android malicious
and based host learning FPR = 0.5% . applications by extracting
Jiqiang techniques accuracy = 98,6%. several features from a large
Liu. [17] number of APK files: Requested
Permissions, Request
Permission Pairs, Used
Permissions, Used Permission
Pairs. But there is consumption
of time.
62 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 8
Yerima et HIDS Permission- On each Bayesian accuracy rate reach to 65- based on static code analysis.
al. [12] based host classifier 85%. achieve high rates of accuracy
than signature-based antivirus.
But there is dynamic support
analysis for any zero days
malwares.
CrowDroid HIDS Anomaly- On each K-Means - analyzing the system call’s logs
[8] based host Clustering in order to know the behavior of
Algorithm the target device while
AntiMalDroid depending on
analyzing the behavior of
system, then generate a signature
of system’s malware behavior.
keep tracking of illegitimate
usage of system services. Which
cause user less privacy.
Radoglou NIDS Anomaly- On network (MLP) neural accuracy reaches to achieve a very high percentage
et al. [23] based network 81,39% and detection rate of accuracy with low percentage
reaches to 85,02%. of false alarms. There is no
saving of resources, which cause
fast battery lost.
Hua et al. NIDS Anomaly- On network Naive Bayes - high percentage of accuracy.
[24] based Algorithm However, coast high
computation.
Y. Aafer et HIDS Virtual On each - accuracy rate reach to an analytical virtual machine to
al. [8] machine Virtual 70%. examine android app through
machine tracking the API calls
In paper NIDS Taint - Between machine - track sensitive data throw third
[7] analysis both host learning party apps at the android
and techniques platform. But modify standard
network android system and used manual
tagging.
In paper NIDS Taint - Between Bayesian accuracy rate reach to explicit flow analysis without
[25] analysis both host classifier 90%. covering the control flow
and analysis.
network
In paper NIDS Emulation- Between - accuracy rate reach to 70- check the network flow and
[26] based both the 75%. native calls to standing the
host and behavior of the suspicious
virtual application. There is a risk not to
machine known the running system
malwares.
In paper NIDS Emulation- Between - accuracy rate reach to dynamically analyzing the
[8] based both the 75%. suspicion application based on
host and virtual machine. But it
virtual monitoring the system by being
machine out of execution environment.
63 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 9
VI. CONCLUSION AND FUTURE WORK [17] Liu, X. & Liu, J. A two-layered permission-based Android malware
detection scheme Mobile cloud computing, services, and engineering
With the developing utilization of Smartphone, the quantity (mobilecloud), 2014 2nd ieee international conference on, 2014, 142-148
of assaults and dangers are additionally on increment. It is
important to give security to end clients from dangers. In this [18] He, D.; Chan, S. & Guizani, M. Mobile application security: malware
threats and defenses IEEE Wireless Communications, IEEE, 2015, 22, 138-
paper, we represent a full picture about malware environment 144
as discussing malware classes and techniques there are [19] Zheng, M.; Sun, M. & Lui, J. C. Droid analytics: A signature based
different techniques have been discussed and listed. Papers analytic system to collect, extract, analyze and associate android
also mention Android malware detection types, methods, malwareTrust, Security and Privacy in Computing and Communications
(TrustCom), 2013 12th IEEE International Conference on, 2013, 163-171
technologies and proposed techniques. In above section we [20] Supriya Kamble, Leena Ragha and Puja Padiya. Comparative Study on
have studied various algorithms, which restrict the detection of Intrusion Detection Systems for Smartphones, IOSR-JCE, 2015
attacks.
In future, work a detailed study with the most effective tools [21] Aung, Z. & Zaw, W. Permission-based android malware detection
International Journal of Scientific & Technology Research, 2013, 2, 228-234
to detect mobile real-time threads.
[22] Liang, S. & Du, X. Permission-combination-based scheme for android
REFERENCES mobile malware detection Communications (ICC), 2014 IEEE International
Conference on, 2014, 2301-2306
64 https://sites.google.com/site/ijcsis/
ISSN 1947-5500
International Journal of Computer Science and Information Security (IJCSIS),
Vol. 17, No. 1, January 2019 10
[38] Roman, R.; Lopez, J. & Mambo, M. Mobile edge computing, fog et al.: [59] Aulakh, J. K.; Sharma, S. & Arora, M.
A survey and analysis of security threats and challenges, Future Generation Mobile Cloud Computing Security Issues: Overview
Computer Systems, Elsevier, 2018, 78, 680-698 International Journal of Advanced Research in Computer Engineering &
[39] Moran, K.; Linares-Vásquez, M.; Bernal-Cárdenas, C.; Vendome, C. & Technology (IJARCET) Volume, 2014, 3
Poshyvanyk, D. Automatically discovering, reporting and reproducing android [60] Yi, S.; Li, C. & Li, Q. A survey of fog computing: concepts, applications
application crashes Software Testing, Verification and Validation (ICST), and issues, Proceedings of the 2015 Workshop on Mobile Big Data, 2015, 37-
2016 IEEE International Conference on, 2016, 33-44 42
[40] Mirzaei, N.; Garcia, J.; Bagheri, H.; Sadeghi, A. & Malek, S. [61] Hussain, A.; Razak, A. & Mkpojiogu, E. The perceived usability of
Reducing combinatorics in gui testing of android applications, Software automated testing tools for mobile applications, Journal of Engineering
Engineering (ICSE), 2016 IEEE/ACM 38th International Conference on, Science and Technology, 2017, 12, 89-97
2016, 559-570 [62] Gai, K.; Qiu, M.; Tao, L. & Zhu, Y. Intrusion detection techniques for
[41] Fridman, L.; Weber, S.; Greenstadt, R. & Kam, M. mobile cloud computing in heterogeneous 5G Security and Communication
Active authentication on mobile devices via stylometry, application usage, Networks, Wiley Online Library, 2016, 9, 3049-3058
web browsing, and GPS location, IEEE Systems Journal, IEEE, 2017, 11, [63] Perez, M. & Kumar, S. A Quick Survey on Cloud Computing and
513-521 Associated Security, Mobility and IoT Issues, Journal of Computer and
[42] Elgendy, I. A.; El-kawkagy, M. & Keshk, A. Communications, Scientific Research Publishing, 2017, 5, 80
Improving the performance of mobile applications using cloud computing [64] Sankaranarayanan, S. & Murugaboopathi, G. Secure Intrusion Detection
Informatics and Systems (INFOS), 2014 9th International Conference on, System in Mobile Ad Hoc Networks Using RSA Algorithm, Recent Trends
2014, PDC-109, Added to IEEE Xplore: 12 February 2015 and Challenges in Computational Models (ICRTCCM), 2017 Second
[43] Faruki, P.; Bharmal, A.; Laxmi, V.; Ganmoor, V.; Gaur, M. S.; Conti, International Conference on, 2017, 354-357
M. & Rajarajan, M. Android security: a survey of issues, malware penetration, [65] Saadi, C. & Chaoui, H. Security Analysis Using IDs Based on Mobile
and defenses IEEE communications surveys & tutorials, IEEE, 2015, 17, 998- Agents and Data Mining Algorithms, IJCSIT) International Journal of
1022 Computer Science and Information Technologies, 2015, 6, 597-60
[44] Suarez-Tangil, G.; Tapiador, J. E.; Peris-Lopez, P. & Ribagorda, A. [66] Khune, R. S. & Thangakumar, J. A cloud-based intrusion detection
Evolution, detection and analysis of malware for smart devices system for Android smartphones, Radar, Communication and Computing
IEEE Communications Surveys & Tutorials, IEEE, 2014, 16, 961-987 (ICRCC), 2012 International Conference on, 2012, 180-184
[45] Walls, J. & Choo, K.-K. R. A review of free cloud-based anti-malware [67] Anirudha A. Kolpyakwar and Prof. Pragati Patil. Intrusion Detection
apps for android, Trustcom/BigDataSE/ISPA, 2015 IEEE, 2015, 1, 1053-1058 System for Android Smartphone in Cloud Environment, IJARCCE, 2015
[46] Qureshi, S. S.; Ahmad, T.; Rafique, K. & others [68] Oyeleye Christopher, A.; Daramola Comfort, Y. & Akinpelu James, A.
Mobile cloud computing as future for mobile applications-Implementation Mob-AIDS: An Intrusion Detection System for the Android Mobile Enterprise
methods and challenging issues Cloud Computing and Intelligence Systems IJCSI International Journal of Computer Science Issues, 2014, 11
(CCIS), 2011 IEEE International Conference on, 2011, 467-471 [69] Mohini, T.; Kumar, S. A. & Nitesh, G. Review on Android and
[47] Gao, J.; Bai, X.; Tsai, W.-T. & Uehara, T. Mobile application testing: a smartphone security, Research Journal of Computer and Information
tutorial, Computer, IEEE, 2014, 47, 46-55 Technology Sciences, 2013, 2320, 6527
[48] Ghorbanian, M.; Shanmugam, B.; Narayansamy, G. & Idris, N. B. [70] Arora, S.; Bawa, R. & Student, M. A review on Intrusion Detection
Signature-based hybrid Intrusion detection system (HIDS) for android devices System to Protect Cloud Data, International Journal of Innovations E
Business Engineering and Industrial Applications Colloquium (BEIAC), 2013 Advancement in Computer Science, 2014, 3, 30-34
IEEE, 2013, 827-831 [71] Omar, M. & Dawson, M. Research in progress-defending android
[49] Houmansadr, A.; Zonouz, S. A. & Berthier, R. A cloud-based intrusion smartphones from malware attacks Advanced Computing and Communication
detection and response system for mobile phones Dependable Systems and Technologies (ACCT), 2013 Third International Conference on, 2013, 288-
Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International 292
Conference on, 2011, 31-32 [72] Halilovic, M. & Subasi, A. Intrusion Detection on Smartphones, arXiv
[50] Peiravian, N. & Zhu, X. Machine learning for android malware detection preprint arXiv:1211.6610, 2012
using permission and api calls Tools with Artificial Intelligence (ICTAI), 2013 [73] Song, H.; Ryoo, S. & Kim, J. H. An integrated test automation
IEEE 25th International Conference on, 2013, 300-305 framework for testing on heterogeneous mobile platforms Software and
[51] Linares-Vásquez, M.; Vendome, C.; Luo, Q. & Poshyvanyk, D. Network Engineering (SSNE), 2011 First ACIS International Symposium on,
How developers detect and fix performance bottlenecks in android apps 2011, 141-145
Software Maintenance and Evolution (ICSME), 2015 IEEE International [74]https://archive.ics.uci.edu/ml/datasets/Detect+Malacious+Executable(Anti
Conference on, 2015, 352-361 Virus) [21 September 2018]
[52] Peiravian, N. & Zhu, X. Machine learning for android malware detection [75] https://cloud.google.com/solutions/mobile/mobile-app-backend-services
using permission and api calls Tools with Artificial Intelligence (ICTAI), 2013 [22 Octuber 2018]
IEEE 25th International Conference on, 2013, 300-305 [76] https://source.android.com/security/ [30 Octuber 2018]
[53] Zachariah, R.; Akash, K.; Yousef, M. S. & Chacko, A. M. [77] http://www.softwaretestinghelp.com/best-mobile-testing-tools/ [22
Android malware detection a survey November 2018]
Circuits and Systems (ICCS), 2017 IEEE International Conference on, 2017, [78] https://forensics.spreitzenbarth.de/android-malware/ [25 November 2018]
238-244 [79] Tuvell, G. & Venugopal, D. Malware detection system and method for
[54] Odusami, M., Abayomi-Alli, O., Misra, S., Shobayo, O., Damasevicius, mobile platforms Google Patents, 2017
R. and Maskeliunas, R., 2018, November. Android Malware Detection: A [80] Kene, S. G. & Theng, D. P. A review on intrusion detection techniques
Survey. In International Conference on Applied Informatics (pp. 255-266). for cloud computing and security challenges, Electronics and Communication
Springer, Cham. Systems (ICECS), 2015 2nd International Conference on, 2015, 227-232
[55] Penning, N.; Hoffman, M.; Nikolai, J. & Wang, Y. Mobile malware [81] Shah, B. & Trivedi, B. H. Improving Performance of Mobile Agent
security challeges and cloud-based detection Collaboration Technologies and Based Intrusion Detection System, Advanced Computing & Communication
Systems (CTS), 2014 International Conference on, 2014, 181-188 Technologies (ACCT), 2015 Fifth International Conference on, 2015, 425-430
[56] Jadhav, S.; Dutia, S.; Calangutkar, K.; Oh, T.; Kim, Y. H. & Kim, J. N. [82] Vasilomanolakis, E.; Karuppayah, S.; Mühlhäuser, M. & Fischer, M.
Cloud-based Android botnet malware detection system, Advanced Taxonomy and survey of collaborative intrusion detection, ACM Computing
Communication Technology (ICACT), 2015 17th International Conference on, Surveys (CSUR), ACM, 2015, 47, 55
2015, 347-352 [83] Ms. Diksha Kale, Dr. Sudhir Sawarkar and Prof. Vijay Bhosale, Revised
[57] Li, X.; Liu, J.; Huo, Y.; Zhang, R. & Yao, Y. An android malware Approach for Smartphone Security Using Cloud and Android Applications,
detection method based on androidmanifest file Cloud Computing and International Journal of Advanced Research in Computer Engineering &
Intelligence Systems (CCIS), 2016 4th International Conference on, 2016, Technology IJARCET, 2015.
239-243 [84] Nandasana, P.; Kumar, R.; Shinde, P.; Dhyani, A. & Parte, R.
[58] Silakari, S.; Chourasia, U. & others, Malware Detection Techniques in Cloud Based Intrusion Detection System, International Journal of Scientific
Cloud Computing Infrastructure using ACMPSO-k means International and Research Publications, Citeseer, 2015, 327
Journal of Computer Science and Information Security, LJS Publishing, 2016,
14, 29
65 https://sites.google.com/site/ijcsis/
ISSN 1947-5500