Monitoring and Detecting Abnormal Behavior in Mobile Cloud

Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure ABSTRACT Recently, several mobile services are changing to cloud-based mobile services with richer communications and higher flexibility. We present a new mobile cloud infrastructure that combines mobile devices and cloud services. This new infrastructure provides virtual mobile instances through cloud computing. To commercialize new services with this infrastructure, service providers should be aware of security issues.
Here, we first define new mobile cloud services through mobile cloud infrastructure and discuss possible security threats through the use of several service scenarios. Then, we propose a methodology and architecture for detecting abnormal behavior through the monitoring of both host and network data. To validate our methodology, we injected malicious programs into our mobile cloud test bed and used a machine learning algorithm to detect the abnormal behavior that arose from these programs. Existing System
On such normal mobile devices, most current vaccine applications detect malware through a signature-based method. Signature-based methods can detect malware in a short space of time with high accuracy, but they cannot detect new malware whose signature is unknown or has been modified. If mobile cloud services are provided, much more malicious applications may appear including new and modified malware. Therefore vaccine applications cannot detect and prohibit them with only signature-based method in the future.

Moreover, mobile cloud infrastructure supports a huge number of virtual mobile instances. When a malware is compromised on a virtual mobile instance, it can be delivered to other virtual mobile instances in the same mobile cloud infrastructure. Without monitoring the network behavior in mobile cloud infrastructure, the malware will spread over the entire infrastructure. Algorithm: Random Forest Machine machine learning algorithm. Architecture: [pic] Proposed System Here We focuses on the abnormal behavior detection in mobile cloud infrastructure.
Although signature-based vaccine applications can target on virtual mobile instances to detect malware, it makes additional overhead on instances, and it is difficult for users to install vaccine software by force when those instances are provided as a service. Behavior-based abnormal detection can address those problems by observing activities in the cloud infrastructure. To achieve this, we design a monitoring architecture using both the host and network data. Using monitored data, abnormal behavior is detected by applying a machine learning algorithm.
To validate our methodology, we built a test bed for mobile cloud infrastructure, intentionally installed malicious mobile programs onto several virtual mobile instances, and then successfully detected the abnormal behavior that arose from those malicious programs. Implementation Implementation is the stage of the project when the theoretical design is turned out into a working system. Thus it can be considered to be the most critical stage in achieving a successful new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system and it’s constraints on implementation, designing of methods to achieve changeover and evaluation of changeover methods. Main Modules:- 1. USER MODULE : In this module, Users are having authentication and security to access the detail which is presented in the ontology system. Before accessing or searching the details user should have the account in that otherwise they should register first. 2. MOBILE CLOUD SERVICE :
Here new mobile cloud service through the virtualization of mobile devices in cloud infrastructure. We describe two main service scenarios to explain how this mobile cloud service can be used. Service scenarios are useful to discuss security threats on mobile cloud infrastructure, because they include users, places, mobile devices, and network types, and user’s interesting contents. We define mobile cloud computing as processing jobs for mobile devices in cloud computing infrastructure and delivering job results to mobile devices. e propose a new mobile cloud service as providing virtual mobile instances through mobile cloud computing. The proposed mobile cloud service provides virtual mobile instances through the combination of a mobile environment and cloud computing. Virtual mobile instances are available on mobile devices by accessing the mobile cloud infrastructure. This means that users connect to virtual mobile instances with their mobile devices and then use computing resources such as CPU, memory, and network resources on mobile cloud infrastructure.
In this case, such mobile devices will have smaller roles to play than current mobile devices. 3. MALWARE DATA : We chose ‘GoldMiner’ malware applications to obtain abnormal data in our mobile cloud infrastructure. We installed the malware onto two hosts and ran it. It gathers location coordinate and device identifiers (IMEI and IMSI), and sends the information to its server. The malware target affecting each mobile instance as zombie, and there are many other malware which have the same purpose although their functionality and behavior are little different from each other.
This kind of malware is more threatening to mobile cloud infrastructure because there are lots of similar virtual mobile instances and they are closely connected to each other. Entered data are not same, compare the database data that is called malwaredata. when If some abnormal behavior’s help to modify the date in External object. 4. ABNORMAL BEHAVIOR DETECTION : We used the Random Forest (RF) machine learning algorithm to train abnormal behavior with our collected data set.
The RF algorithm is a combination of decision trees that each tree depends on the values of a random vector sampled independently and with the same distribution for all trees in the forest. We represented the collected features as a vector with the data subsequently used to train our collected data set. System Configuration:- H/W System Configuration:- Processor – Pentium –III Speed – 1. 1 Ghz RAM – 256 MB(min) Hard Disk – 20 GB Floppy Drive – 1. 4 MB Key Board – Standard Windows Keyboard Mouse – Two or Three Button Mouse Monitor – SVGA S/W System Configuration:- ? Operating System :Windows95/98/2000/XP ? Application Server : Tomcat5. 0/6. X ? Front End : HTML, Java, Jsp ? Scripts : JavaScript. ? Server side Script : Java Server Pages. ? Database : Mysql 5. 0 ? Database Connectivity : JDBC.

Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with MyhomeworkGeeks
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 20k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Business and administrative studies
excellent paper
Customer 452773, March 3rd, 2023
Business and administrative studies
always perfect work and always completed early
Customer 452773, February 21st, 2023
BUSINESSADMINECO535
excellent work
Customer 452773, October 6th, 2023
Business and administrative studies
excellent, got a 100
Customer 452773, May 17th, 2023
FIN571
excellent
Customer 452773, March 15th, 2024
Management
Thank you!!! I received my order in record timing.
Customer 452551, February 9th, 2021
Business and administrative studies
Thank you for your hard work and effort. Made a 96 out of 125 points Lacked information from the rubic
Customer 452773, October 27th, 2023
Business and administrative studies
Thank you for your hard work and help
Customer 452773, February 21st, 2023
Psychology
Thank you!
Customer 452545, February 6th, 2021
Social Work and Human Services
Although it took 2 revisions I am satisfied but I did receive it late because of that.
Customer 452603, March 25th, 2021
10th grade English
very good
Customer 452773, March 26th, 2023
Social Work and Human Services
Great work I would love to continue working with this writer thought out the 11 week course.
Customer 452667, May 30th, 2021
11,595
Customer reviews in total
96%
Current satisfaction rate
3 pages
Average paper length
37%
Customers referred by a friend
OUR GIFT TO YOU
15% OFF your first order
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Claim my 15% OFF Order in Chat
Close

Sometimes it is hard to do all the work on your own

Let us help you get a good grade on your paper. Get professional help and free up your time for more important courses. Let us handle your;

  • Dissertations and Thesis
  • Essays
  • All Assignments

  • Research papers
  • Terms Papers
  • Online Classes
Live ChatWhatsApp