SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 182 
DETECT AND IMMUNE MOBILE CLOUD INFRASTRUCTURE A.Malathy1, J.Gayathri2, T.A.Vijayalakshmi3, M.Ramkumar4 1PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 2PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 3PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 4Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu Abstract Mobile devices with cloud based service are highly effective and they are very flexible and adaptable. Mobile cloud infrastructure is a new concept where mobile devices and cloud services are clubbed together. As it a commodity, service providers should know the security issues. In this paper various security threats are widely discussed based on situation. A new methodology is proposed in order to detect the abnormal behavior. By detect the host and the communication channel certain malicious programs are injected in the test bed in order to identify the abnormal behavior. Using machine learning algorithm, these suspicious programs are detected. To find the next neighboring node and to detect the fault, FDMC algorithm is implemented. Keywords: Fault Detection, Virtual Mobile Instances Signature based. 
--------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Different mobile services are provided as application to electronic gadgets like smart phones, tables and cloud based mobile services benefit users by providing enormous flexibility and wealthy communication. Data can be retrieved, processed and send at any time using mobile devices. Flexibility is there when mobile devices are accessed using cloud computing. Each virtual instance is denoted by a mobile device and users can connect and make use of it. Virtualization in mobile devices in cloud platform provides virtual instances to the mobile users. Virtual cloud infrastructure gives the virtual mobile instances. These instances are managed using extensive power and storage capacity. Virtual smartphone over IP is a classic example of virtual mobile instances. The threatening thing for the service provider is the security. Even through signature based preventive algorithms are used in the virtual mobile instances, in order to find the malicious and suspicious applications, which basically run on the mobile cloud environment in the mobile cloud infrastructure certain malicious programs are injected which actually spreads the entire cloud and affects the commuting devices as well. Using FDMC algorithm to find the next neighboring node and detect the fault. Certain signature based vaccine are injected in the cloud in order to keep trace the malfunctions in the cloud instances. By monitoring the data, suspicious behavior can be detected using the machine learning algorithm. In order to validate these methodologies a test bed is created which is basically a platform to test large projects. In this paper the entire concept is classified in to different section. 
 Detecting the suspicious behavior in the cloud infrastructure. 
 Security aspects and the possible situations of attacks 
 Monitoring the architecture of the cloud infrastructure. 
 Correct validation for the proposed architecture. 
 Monitoring metrics needs to be configured for providing services and charging the users 
1.1 Cloud Services based on Certain Situations Based on the virtualization concept certain malicious mobile applications are allowed to execute in the virtual mobile instances and if any program attacks the cloud, it leads to major problem. This paper focuses on the abnormal behavior in the cloud infrastructure Continuous monitoring is essential in order to find the malfunction in the cloud. So monitoring architecture is created to check both host and the data network flow. Using machine learning algorithm the unusual behavior is detected by implementing in the test bed environment. 1.2 Mobile Devices as a part of Cloud Construct Mobile computing assigns different roles to mobile devices. Assigning the cloud through mobile devices is generally termed as mobile computing. Different mobile devices form a cloud group and various jobs are delegated to different mobile devices to perform the job faster in the cloud computing infrastructure. 
Users may execute mobile application on demand services based on their needs. So the service providers also get benefited and obtain more profit. Perhaps this would have been better if the services are free of malware. So monitoring the entire host and entire data is a feasible host.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 183 
Machine learning techniques and monitoring real time traffic is a solution. 
Fig 1: Mobile instances vs. mobile cloud 2. Detecting the Suspicious Behavior Behavior determines what application runs on the mobile cloud infrastructure. Application creates flow between internal or external. These actions reflect the value of virtual resources. If any unexpected changes happen, the mobile instances intimate the cloud infrastructure and the user through alarm. Using signaled base method malware are detected with high accuracy and short duration. This generally detects the existing malware but couldn’t able to identify the newly injected malware. Vaccine application cannot detect the new malware. Cloud infrastructure connects the number of virtual instances when the malware is accepted. It sends to the entire cloud infrastructure. In order to resolve this problem host data are detected in the virtual instance and network are detected in the cloud infrastructure. There are two types of mobile cloud contacts creation and non-creation. Creation contacts directly with the mobile users and non-creation contacts by manipulating the background jobs. 2.1 Role of Hypervisor A hypervisor is a software program which runs the virtual machines. Once the hypervisor is installed on the physical device, it splits the nodes into right and non-rights. Virtual instances executes in non-right platforms. In order to monitor, the virtual instance, there is a bridge applications installed in the virtual mobile instance. This agent based programs supervises 
2.2 Types of Mobile Users 
Individual Users: Users are classified into three categories normal users, advanced users and developers based on their requirements. 
Normal Users: Users are interested in gaming services provided by cloud providers and they access cloud through 3G/4G or Wi-Fi. Advanced users: Users from private organization may use cloud for their office work. They access cloud services via office Wi-Fi or 3G/4G for simulation work. Developers: Frequent changes in cloud are necessary for developers; they may use all kind of services provided by cloud. Office Workers: We categorize office workers as staff in a main office, Staff in branches and agents based on the information they used. 
Fig 2: Types of cloud users Staff in a Main Office: Mobile office system is installed in the main office which can be used by the employees. Staff in Branch Offices: User needs to have a static mobile environment where they can access system from the branch office to the head office. Agents: People work with the company to develop a project may use mobile office system. 3. IMPLEMENTING SECURITY ON MOBILE PRIVATE CLOUD Most of the company wants to have a control over the mobile devices when it is provided by the company or by BYOD (Bring your own device). Mobile Device Management (MDM) with rigid deployment, and stable visibility and control that spans in mobile devices, real documents and the application. Actually this MDM supports all the latest mobile devices including apple iPhone, blackberry, kindle fire, windows phone.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 184 
3.1 Security Aspects and the Possible Situations of Attacks Using the machine learning algorithm, certain features are extracted from the hardware devices like CPU, network utilization, memory were all monitored and malwares are detected using the mobile application .It determines the behavior of the mobile devices while surfing the internet, texting ,making calls and can able to detect the behavior of the device. 3.2 Fault Detection in Mobile Cloud It tracks the performance of the machine and raises an alarm to found the fault. FDMC is faster than brute-force algorithm. In cloud infrastructure one machine is to play a vital role in mobile cloud called Monitor. Entities are E1, E2,…….En. Each machine can have the own data partition Ii , test points are sent by P0 it read from the disk. At any moment of time P0, maintain a current list of t, observation time Ok found. Initially OK is empty the new Observation time is updated and receive from the entity E1, E2,…….En. The monitor to maintain the cut-off threshold C it initially set to infinitive and sequentially increase the value. Once OK changes, it set to the least value in OK and sends it to the entire machine in the cloud. In the CHECK mode to test the block of data read from the memory based on local dataset it trim the points when the current threshold Ci is less than it send the test point to next machine in the ring. The machine Pi maintain threshold Ci it has receive from the monitor P0. Algorithm: CHECK () Procedure CHECK () Begin For all blocks of data in Ii do 
c getNextBlock(Ii); 
For all points bB do 
Nk(b) ⍉ 
For all points xIi do 
For bB, b≠x do If rb < ci then remove b from B 
For bB do Send (b, Nk(b),rb)to machine Pi+1 3.3 Unusual Behavior in Cloud Infrastructure There is lots of interruption for cloud services. The proposed design can find the anonymous or malicious behavior in the cloud infrastructure. The interruption detection system (IDS) manages the problems in the host interruption detection system (HIDS) and network Interruption detection system. This study doesn’t provide how the malicious program is detected. This architecture doesn’t display virtualization of each node, but it has the impact in the performance of cloud computing. 
Mobile Cloud Computing Group 
Number of mobile devices is combined to form a cloud computing group where a larger task is delegated to different mobile devices to make the job done in a shorter period of time and combination of mobile atmosphere. 
3.4 Enrolling Mobile Devices Just by selecting the MDM services and by configuring the device, the particular devices get enrolled. The enrollments request can be obtained using various means (i.e.) by email communication or by SMS or by a custom universal resource locator Authentication should be provided based on the service provided and the employee designation. By leveraging the existing authentication the services can integrated with the enterprise system .Mobile apps expose lots of personal information. 
 Securing mobile devices 
 By introducing the passcode policies, certain level of security can be reached 
 By strongly enforcing the encryption standards 
 Identifying the rooted devices 
 Stolen devices should be locked so that unauthorized access can be prevented 
Geo-Fencing is a software program which allows system admin to induce a program whenever there is enter or exit condition of the boundaries which is determined by administrator, an automatic intimation or alert is sent. So the company admin can set up boundaries and whenever the mobile is beyond the boundaries, he can disable the device, which is in the private cloud environment. Evaluation – Gathering behavior data: Test bed is implemented to validate the methodology and architecture. Xen hypervisor is installed on each physical node. Virtual images are created are created using the kernel .Linux gingerbread 2.36 is used and port is mirrored for each physical node. 4. CONCLUSIONS In the virtual cloud instance abnormal behaviors can be detected using signature based algorithm along with FDMC algorithm so that it finds the nearest neighboring node. Hence all the mobile devices can be checked whether it is affected by malicious program in the cloud. REFERENCES [1]. Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, and James Won-Ki Hong, “ Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure” 2012 IEEE/IFIP 3rd Workshop on Cloud Management (CloudMan) [2]. Kanishka Bhaduri, Kamalika Das, Bryan L. Matthews “Detecting Abnormal Machine Characteristics in Cloud Infrastructures”
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 
_______________________________________________________________________________________ 
Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 185 
[3]. E. Y. Chen and M. Itoh, "Virtual Smartphone over IP", The next IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montrreal, Canada, June 2010, pp.1-6. [4]. F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges", IDC eXchange(http://blogs.idc.com/ie/), August 14, 2008. BIOGRAPHIES 
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes Mobile computing and cloud computing 
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes wireless sensor network and cloud computing. 
Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes cloud computing, big data and mobile cloud.

More Related Content

PDF
Log into android mobile to fetch the device oriented information using remote...
PDF
Log into android mobile to fetch the device oriented information using remote...
PDF
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
PDF
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
PDF
C6524029320
PDF
IRJET- Fish Recognition and Detection Based on Deep Learning
PDF
Cloud Based intrusion Detection System
PDF
A smart, location based time and
Log into android mobile to fetch the device oriented information using remote...
Log into android mobile to fetch the device oriented information using remote...
Transparent Developmental Biometric Based System Protect User Reauthenticatio...
OFFLINE CONTEXT AWARE COMPUTING FOR PROVIDING USER SPECIFIC RESULTS
C6524029320
IRJET- Fish Recognition and Detection Based on Deep Learning
Cloud Based intrusion Detection System
A smart, location based time and

What's hot (15)

PDF
A Survey on Security for Server Using Spontaneous Face Detection
PDF
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
PDF
Comparative Study on Intrusion Detection Systems for Smartphones
PDF
IRJET - Door Lock Control using Wireless Biometric
PDF
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
PPTX
Use biometrics for identity management of cloud users to enhanced the securit...
PDF
IRJET - Image Watermarking using QR Code
PDF
IRJET- Women Safety Application using Firebase and Geocoder
PDF
IoT Network Attack Detection using Supervised Machine Learning
PDF
I018145157
PPTX
Securing Mobile Cloud Using Fingerprint Authentication
PDF
Remote surveillance system for mobile application
PDF
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
PDF
Improved authentication using arduino based voice
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
A Survey on Security for Server Using Spontaneous Face Detection
IoT: Effective Authentication System (EAS) using Hash based Encryption on RFI...
Comparative Study on Intrusion Detection Systems for Smartphones
IRJET - Door Lock Control using Wireless Biometric
IRJET- Improving Employee Tracking and Monitoring System using Advanced M...
Use biometrics for identity management of cloud users to enhanced the securit...
IRJET - Image Watermarking using QR Code
IRJET- Women Safety Application using Firebase and Geocoder
IoT Network Attack Detection using Supervised Machine Learning
I018145157
Securing Mobile Cloud Using Fingerprint Authentication
Remote surveillance system for mobile application
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
Improved authentication using arduino based voice
Malware threat analysis techniques and approaches for IoT applications: a review
Ad

Viewers also liked (20)

PDF
Comparison of friction stirs welding technique with conventional welding methods
PDF
An experimental investigation into the performance
PDF
Analysis of data transmission in wireless lan for 802.11
PDF
Fpga implementation of race control algorithm for full bridge prcp converter
PDF
Experimental investigation of chemical etching on en 5 steel using nitric acid
PDF
Night image enhancement using fusion technique
PDF
Performance improvement of energy aware and adaptive routing protocols for ma...
PDF
Sdci scalable distributed cache indexing for cache consistency for mobile env...
PDF
Can fracture mechanics predict damage due disaster of structures
PDF
Survey methodology and geometrical analysis of late
PDF
Managing drought short term strategies in semi arid
PDF
A survey on nuclear to-cytoplasmic ratio analysis
PDF
Transition for regular to mach reflection hysteresis
PDF
Speech compression analysis using matlab
PDF
Image processing techniques applied for pitting
PDF
System of quasilinear equations of reaction diffusion
PDF
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
PDF
Design of dual master i2 c bus controller
PDF
Performance of high power light emitting diode for
PDF
A study on security responsibilities and adoption in
Comparison of friction stirs welding technique with conventional welding methods
An experimental investigation into the performance
Analysis of data transmission in wireless lan for 802.11
Fpga implementation of race control algorithm for full bridge prcp converter
Experimental investigation of chemical etching on en 5 steel using nitric acid
Night image enhancement using fusion technique
Performance improvement of energy aware and adaptive routing protocols for ma...
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Can fracture mechanics predict damage due disaster of structures
Survey methodology and geometrical analysis of late
Managing drought short term strategies in semi arid
A survey on nuclear to-cytoplasmic ratio analysis
Transition for regular to mach reflection hysteresis
Speech compression analysis using matlab
Image processing techniques applied for pitting
System of quasilinear equations of reaction diffusion
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Design of dual master i2 c bus controller
Performance of high power light emitting diode for
A study on security responsibilities and adoption in
Ad

Similar to Detect and immune mobile cloud infrastructure (20)

PDF
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
PDF
A Survey of Cyber foraging systems: Open Issues, Research Challenges
PDF
Fog computing
PDF
Securing mobile cloud using finger print authentication
PDF
Securing Mobile Cloud Using Finger Print Authentication
PDF
Security Attacks And Solutions On Ubiquitous Computing Networks
PDF
International Journal of Engineering Research and Development
PDF
Smartphone Remote Detection and Wipe System using SMS
PDF
Fog computing a new concept to minimize the attacks and to provide security i...
PDF
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
PDF
A017360104
PDF
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
PDF
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
PDF
Unit 2.design computing architecture 2.1
PDF
Analysis and reporting of programming skills using mobile cloud based compiler
PDF
An enhanced approach for securing mobile agents from
PDF
Secure intrusion detection and countermeasure selection in virtual system usi...
PDF
Smart surveillance using deep learning
PDF
20120130406025
PDF
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...
IRJET- Monitoring and Detecting Abnormal Behaviour in Mobile Cloud Infrastruc...
A Survey of Cyber foraging systems: Open Issues, Research Challenges
Fog computing
Securing mobile cloud using finger print authentication
Securing Mobile Cloud Using Finger Print Authentication
Security Attacks And Solutions On Ubiquitous Computing Networks
International Journal of Engineering Research and Development
Smartphone Remote Detection and Wipe System using SMS
Fog computing a new concept to minimize the attacks and to provide security i...
Secure Virtualization for Cloud Environment Using Guest OS and VMM-based Tech...
A017360104
APPLICATION OF MOBILE AGENTS FOR SECURITY USING MULTILEVEL ACCESS CONTROL
VIRTUAL MACHINES DETECTION METHODS USING IP TIMESTAMPS PATTERN CHARACTERISTIC
Unit 2.design computing architecture 2.1
Analysis and reporting of programming skills using mobile cloud based compiler
An enhanced approach for securing mobile agents from
Secure intrusion detection and countermeasure selection in virtual system usi...
Smart surveillance using deep learning
20120130406025
IRJET- Local Security Enhancement and Intrusion Prevention in Android Dev...

More from eSAT Publishing House (20)

PDF
Likely impacts of hudhud on the environment of visakhapatnam
PDF
Impact of flood disaster in a drought prone area – case study of alampur vill...
PDF
Hudhud cyclone – a severe disaster in visakhapatnam
PDF
Groundwater investigation using geophysical methods a case study of pydibhim...
PDF
Flood related disasters concerned to urban flooding in bangalore, india
PDF
Enhancing post disaster recovery by optimal infrastructure capacity building
PDF
Effect of lintel and lintel band on the global performance of reinforced conc...
PDF
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
PDF
Wind damage to buildings, infrastrucuture and landscape elements along the be...
PDF
Shear strength of rc deep beam panels – a review
PDF
Role of voluntary teams of professional engineers in dissater management – ex...
PDF
Risk analysis and environmental hazard management
PDF
Review study on performance of seismically tested repaired shear walls
PDF
Monitoring and assessment of air quality with reference to dust particles (pm...
PDF
Low cost wireless sensor networks and smartphone applications for disaster ma...
PDF
Coastal zones – seismic vulnerability an analysis from east coast of india
PDF
Assessment of seismic susceptibility of rc buildings
PDF
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
PDF
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
PDF
Disaster recovery sustainable housing
Likely impacts of hudhud on the environment of visakhapatnam
Impact of flood disaster in a drought prone area – case study of alampur vill...
Hudhud cyclone – a severe disaster in visakhapatnam
Groundwater investigation using geophysical methods a case study of pydibhim...
Flood related disasters concerned to urban flooding in bangalore, india
Enhancing post disaster recovery by optimal infrastructure capacity building
Effect of lintel and lintel band on the global performance of reinforced conc...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Shear strength of rc deep beam panels – a review
Role of voluntary teams of professional engineers in dissater management – ex...
Risk analysis and environmental hazard management
Review study on performance of seismically tested repaired shear walls
Monitoring and assessment of air quality with reference to dust particles (pm...
Low cost wireless sensor networks and smartphone applications for disaster ma...
Coastal zones – seismic vulnerability an analysis from east coast of india
Assessment of seismic susceptibility of rc buildings
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Disaster recovery sustainable housing

Recently uploaded (20)

PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Digital Logic Computer Design lecture notes
PPTX
Welding lecture in detail for understanding
PDF
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
PDF
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
additive manufacturing of ss316l using mig welding
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
web development for engineering and engineering
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
Geodesy 1.pptx...............................................
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Digital Logic Computer Design lecture notes
Welding lecture in detail for understanding
Enhancing Cyber Defense Against Zero-Day Attacks using Ensemble Neural Networks
TFEC-4-2020-Design-Guide-for-Timber-Roof-Trusses.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
additive manufacturing of ss316l using mig welding
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
OOP with Java - Java Introduction (Basics)
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
CYBER-CRIMES AND SECURITY A guide to understanding
Model Code of Practice - Construction Work - 21102022 .pdf
web development for engineering and engineering
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Foundation to blockchain - A guide to Blockchain Tech
Geodesy 1.pptx...............................................

Detect and immune mobile cloud infrastructure

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 182 DETECT AND IMMUNE MOBILE CLOUD INFRASTRUCTURE A.Malathy1, J.Gayathri2, T.A.Vijayalakshmi3, M.Ramkumar4 1PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 2PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 3PG Scholar, Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu 4Department of computer science, Knowledge Institute of Technology, Salem, Tamil Nadu Abstract Mobile devices with cloud based service are highly effective and they are very flexible and adaptable. Mobile cloud infrastructure is a new concept where mobile devices and cloud services are clubbed together. As it a commodity, service providers should know the security issues. In this paper various security threats are widely discussed based on situation. A new methodology is proposed in order to detect the abnormal behavior. By detect the host and the communication channel certain malicious programs are injected in the test bed in order to identify the abnormal behavior. Using machine learning algorithm, these suspicious programs are detected. To find the next neighboring node and to detect the fault, FDMC algorithm is implemented. Keywords: Fault Detection, Virtual Mobile Instances Signature based. --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Different mobile services are provided as application to electronic gadgets like smart phones, tables and cloud based mobile services benefit users by providing enormous flexibility and wealthy communication. Data can be retrieved, processed and send at any time using mobile devices. Flexibility is there when mobile devices are accessed using cloud computing. Each virtual instance is denoted by a mobile device and users can connect and make use of it. Virtualization in mobile devices in cloud platform provides virtual instances to the mobile users. Virtual cloud infrastructure gives the virtual mobile instances. These instances are managed using extensive power and storage capacity. Virtual smartphone over IP is a classic example of virtual mobile instances. The threatening thing for the service provider is the security. Even through signature based preventive algorithms are used in the virtual mobile instances, in order to find the malicious and suspicious applications, which basically run on the mobile cloud environment in the mobile cloud infrastructure certain malicious programs are injected which actually spreads the entire cloud and affects the commuting devices as well. Using FDMC algorithm to find the next neighboring node and detect the fault. Certain signature based vaccine are injected in the cloud in order to keep trace the malfunctions in the cloud instances. By monitoring the data, suspicious behavior can be detected using the machine learning algorithm. In order to validate these methodologies a test bed is created which is basically a platform to test large projects. In this paper the entire concept is classified in to different section.  Detecting the suspicious behavior in the cloud infrastructure.  Security aspects and the possible situations of attacks  Monitoring the architecture of the cloud infrastructure.  Correct validation for the proposed architecture.  Monitoring metrics needs to be configured for providing services and charging the users 1.1 Cloud Services based on Certain Situations Based on the virtualization concept certain malicious mobile applications are allowed to execute in the virtual mobile instances and if any program attacks the cloud, it leads to major problem. This paper focuses on the abnormal behavior in the cloud infrastructure Continuous monitoring is essential in order to find the malfunction in the cloud. So monitoring architecture is created to check both host and the data network flow. Using machine learning algorithm the unusual behavior is detected by implementing in the test bed environment. 1.2 Mobile Devices as a part of Cloud Construct Mobile computing assigns different roles to mobile devices. Assigning the cloud through mobile devices is generally termed as mobile computing. Different mobile devices form a cloud group and various jobs are delegated to different mobile devices to perform the job faster in the cloud computing infrastructure. Users may execute mobile application on demand services based on their needs. So the service providers also get benefited and obtain more profit. Perhaps this would have been better if the services are free of malware. So monitoring the entire host and entire data is a feasible host.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 183 Machine learning techniques and monitoring real time traffic is a solution. Fig 1: Mobile instances vs. mobile cloud 2. Detecting the Suspicious Behavior Behavior determines what application runs on the mobile cloud infrastructure. Application creates flow between internal or external. These actions reflect the value of virtual resources. If any unexpected changes happen, the mobile instances intimate the cloud infrastructure and the user through alarm. Using signaled base method malware are detected with high accuracy and short duration. This generally detects the existing malware but couldn’t able to identify the newly injected malware. Vaccine application cannot detect the new malware. Cloud infrastructure connects the number of virtual instances when the malware is accepted. It sends to the entire cloud infrastructure. In order to resolve this problem host data are detected in the virtual instance and network are detected in the cloud infrastructure. There are two types of mobile cloud contacts creation and non-creation. Creation contacts directly with the mobile users and non-creation contacts by manipulating the background jobs. 2.1 Role of Hypervisor A hypervisor is a software program which runs the virtual machines. Once the hypervisor is installed on the physical device, it splits the nodes into right and non-rights. Virtual instances executes in non-right platforms. In order to monitor, the virtual instance, there is a bridge applications installed in the virtual mobile instance. This agent based programs supervises 2.2 Types of Mobile Users Individual Users: Users are classified into three categories normal users, advanced users and developers based on their requirements. Normal Users: Users are interested in gaming services provided by cloud providers and they access cloud through 3G/4G or Wi-Fi. Advanced users: Users from private organization may use cloud for their office work. They access cloud services via office Wi-Fi or 3G/4G for simulation work. Developers: Frequent changes in cloud are necessary for developers; they may use all kind of services provided by cloud. Office Workers: We categorize office workers as staff in a main office, Staff in branches and agents based on the information they used. Fig 2: Types of cloud users Staff in a Main Office: Mobile office system is installed in the main office which can be used by the employees. Staff in Branch Offices: User needs to have a static mobile environment where they can access system from the branch office to the head office. Agents: People work with the company to develop a project may use mobile office system. 3. IMPLEMENTING SECURITY ON MOBILE PRIVATE CLOUD Most of the company wants to have a control over the mobile devices when it is provided by the company or by BYOD (Bring your own device). Mobile Device Management (MDM) with rigid deployment, and stable visibility and control that spans in mobile devices, real documents and the application. Actually this MDM supports all the latest mobile devices including apple iPhone, blackberry, kindle fire, windows phone.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 184 3.1 Security Aspects and the Possible Situations of Attacks Using the machine learning algorithm, certain features are extracted from the hardware devices like CPU, network utilization, memory were all monitored and malwares are detected using the mobile application .It determines the behavior of the mobile devices while surfing the internet, texting ,making calls and can able to detect the behavior of the device. 3.2 Fault Detection in Mobile Cloud It tracks the performance of the machine and raises an alarm to found the fault. FDMC is faster than brute-force algorithm. In cloud infrastructure one machine is to play a vital role in mobile cloud called Monitor. Entities are E1, E2,…….En. Each machine can have the own data partition Ii , test points are sent by P0 it read from the disk. At any moment of time P0, maintain a current list of t, observation time Ok found. Initially OK is empty the new Observation time is updated and receive from the entity E1, E2,…….En. The monitor to maintain the cut-off threshold C it initially set to infinitive and sequentially increase the value. Once OK changes, it set to the least value in OK and sends it to the entire machine in the cloud. In the CHECK mode to test the block of data read from the memory based on local dataset it trim the points when the current threshold Ci is less than it send the test point to next machine in the ring. The machine Pi maintain threshold Ci it has receive from the monitor P0. Algorithm: CHECK () Procedure CHECK () Begin For all blocks of data in Ii do c getNextBlock(Ii); For all points bB do Nk(b) ⍉ For all points xIi do For bB, b≠x do If rb < ci then remove b from B For bB do Send (b, Nk(b),rb)to machine Pi+1 3.3 Unusual Behavior in Cloud Infrastructure There is lots of interruption for cloud services. The proposed design can find the anonymous or malicious behavior in the cloud infrastructure. The interruption detection system (IDS) manages the problems in the host interruption detection system (HIDS) and network Interruption detection system. This study doesn’t provide how the malicious program is detected. This architecture doesn’t display virtualization of each node, but it has the impact in the performance of cloud computing. Mobile Cloud Computing Group Number of mobile devices is combined to form a cloud computing group where a larger task is delegated to different mobile devices to make the job done in a shorter period of time and combination of mobile atmosphere. 3.4 Enrolling Mobile Devices Just by selecting the MDM services and by configuring the device, the particular devices get enrolled. The enrollments request can be obtained using various means (i.e.) by email communication or by SMS or by a custom universal resource locator Authentication should be provided based on the service provided and the employee designation. By leveraging the existing authentication the services can integrated with the enterprise system .Mobile apps expose lots of personal information.  Securing mobile devices  By introducing the passcode policies, certain level of security can be reached  By strongly enforcing the encryption standards  Identifying the rooted devices  Stolen devices should be locked so that unauthorized access can be prevented Geo-Fencing is a software program which allows system admin to induce a program whenever there is enter or exit condition of the boundaries which is determined by administrator, an automatic intimation or alert is sent. So the company admin can set up boundaries and whenever the mobile is beyond the boundaries, he can disable the device, which is in the private cloud environment. Evaluation – Gathering behavior data: Test bed is implemented to validate the methodology and architecture. Xen hypervisor is installed on each physical node. Virtual images are created are created using the kernel .Linux gingerbread 2.36 is used and port is mirrored for each physical node. 4. CONCLUSIONS In the virtual cloud instance abnormal behaviors can be detected using signature based algorithm along with FDMC algorithm so that it finds the nearest neighboring node. Hence all the mobile devices can be checked whether it is affected by malicious program in the cloud. REFERENCES [1]. Taehyun Kim, Yeongrak Choi, Seunghee Han, Jae Yoon Chung, Jonghwan Hyun, Jian Li, and James Won-Ki Hong, “ Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure” 2012 IEEE/IFIP 3rd Workshop on Cloud Management (CloudMan) [2]. Kanishka Bhaduri, Kamalika Das, Bryan L. Matthews “Detecting Abnormal Machine Characteristics in Cloud Infrastructures”
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Special Issue: 11 | NCAMESHE - 2014 | Jun-2014, Available @ http://www.ijret.org 185 [3]. E. Y. Chen and M. Itoh, "Virtual Smartphone over IP", The next IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2010), Montrreal, Canada, June 2010, pp.1-6. [4]. F. Gens, "IT Cloud Services User Survey, pt.2: Top Benefits & Challenges", IDC eXchange(http://blogs.idc.com/ie/), August 14, 2008. BIOGRAPHIES Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes Mobile computing and cloud computing Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes wireless sensor network and cloud computing. Currently Pursuing Master of Engineering Degree in Knowledge Institute of Technology Area of interest includes cloud computing, big data and mobile cloud.