Main Article Content
Scandalous venomous files like Trojan, Worm, and Malware has the potential to destroy any line businesses by luring those organization vital data’s. This is also a huge headache for cloud computing architecture where many virtual machine and cloud service provider are involved for data uploading and downloading as no company can afford its valuable data loss. Security is the main issue for many large organization and cloud service provider. Amongst many security issues zombie attack is the most notorious type of attack. This attack has the capability to reduce network performance either by delaying the service or by consuming network bandwidth. This attack can be an insider attack or it can be an outsider attack, here the malevolent users will gain the data of any legitimate user by luring them with venomous zombie file which will compromise the victims system and this node will start communicate with virtual machine on the behalf of legitimate user. Despite many techniques like Honeypot, antivirus software are there to prevent such activities it cannot completely protect the system from malicious files as most of the harmful files which can compromise the system goes undetectable by the existing systems. The proposed method through deep content mining technique along with the existing techniques shows a promising result by detecting all possible vulnerable files along with those undetectable venomous file by existing systems.