{"title":"跨集群的恶意软件检测","authors":"Manjushree C V, A. Nandakumar","doi":"10.1109/IITCEE57236.2023.10090979","DOIUrl":null,"url":null,"abstract":"Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection based on optimal data classification. An improved glowworm swarm optimization (IGWSO) algorithm is proposed for clustering in the input dataset into different groups. After clustering, recurrent deep neural network based computation is used for deriving different trust levels for cloud information that classify the suspected intrusion. The proposed TMD system implemented in java with cloudsim tool evidently discovers the effectiveness of the algorithm over existing state of art systems on the parameters of high detection, precision, recall and F-measures.","PeriodicalId":124653,"journal":{"name":"2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Malware Detection across Clusters\",\"authors\":\"Manjushree C V, A. Nandakumar\",\"doi\":\"10.1109/IITCEE57236.2023.10090979\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection based on optimal data classification. An improved glowworm swarm optimization (IGWSO) algorithm is proposed for clustering in the input dataset into different groups. After clustering, recurrent deep neural network based computation is used for deriving different trust levels for cloud information that classify the suspected intrusion. The proposed TMD system implemented in java with cloudsim tool evidently discovers the effectiveness of the algorithm over existing state of art systems on the parameters of high detection, precision, recall and F-measures.\",\"PeriodicalId\":124653,\"journal\":{\"name\":\"2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)\",\"volume\":\"31 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-01-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IITCEE57236.2023.10090979\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 International Conference on Intelligent and Innovative Technologies in Computing, Electrical and Electronics (IITCEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IITCEE57236.2023.10090979","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Due to diverse software vulnerabilities and hardware attacks, user credentials are vulnerable or could land in demilitarized zones. An attempt is made to explore and finally proposed a trust based malware detection based on optimal data classification. An improved glowworm swarm optimization (IGWSO) algorithm is proposed for clustering in the input dataset into different groups. After clustering, recurrent deep neural network based computation is used for deriving different trust levels for cloud information that classify the suspected intrusion. The proposed TMD system implemented in java with cloudsim tool evidently discovers the effectiveness of the algorithm over existing state of art systems on the parameters of high detection, precision, recall and F-measures.