Authors: Shun-Te Liu, Yi-Ming Chen
Addresses: Department of Information Management, National Central University, 300, Jhongda Rd., Jhongli, Taoyuan 32001, Taiwan; Information and Communication Security Lab, TL, Chunghwa Telecom co., Ltd., 12, Lane 551, Min-Tsu Road Sec.5 Yang-Mei, Taoyuan 32617, Taiwan. ' Department of Information Management, National Central University, 300, Jhongda Rd., Jhongli, Taoyuan 32001, Taiwan
Abstract: As malware becomes pervasive and fast-evolving on the internet, it is important to not only detect malware as early as possible but also to determine which computer has been attacked. Among the various methods to find the malware, retrospective detection is a promising one. Once a threat is identified, it allows one to determine exactly which host has the threat by searching historical information. In the past, the huge volume of historical information represents an insurmountable barrier to such traces, but this barrier can be broken by cloud computing technologies.
Keywords: cloud computing; Hadoop; malware attacks; retrospective detection; malware detection.
International Journal of Information Technology, Communications and Convergence, 2011 Vol.1 No.3, pp.280 - 296
Published online: 28 Aug 2011 *Full-text access for editors Access for subscribers Purchase this article Comment on this article