2018
DOI: 10.24138/jcomss.v14i3.537
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malware Attacks on Virtual Machines for a Self-Heal Approach in Cloud Computing using VM Snapshots

Abstract: Abstract-Cloud Computing strives to be dynamic as a service oriented architecture (SoA). The services in the SoA are rendered in terms of private, public and in many other commercial domain aspects. These services should be secured and thus are very vital to the cloud infrastructure. In order, to secure and maintain resilience in the cloud, it not only has to have the ability to identify the known threats but also to new challenges that target the infrastructure of a cloud. In this paper, we introduce and disc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…The proposed DBN + HEMA based attack detection model in cloud was implemented in Python and the results were observed. In addition, the betterment of the proposed DBN + HEMA based attack detection was compared over other conventional models like RNN, 47 SVM, 34 KNN 48 and Naive Bayes 34 with respect to the performance metrics like “accuracy, sensitivity, specificity, precision, FPR, F‐measure Recall, and MCC.” Here, the performance analysis was carried out by varying the split ratio that ranges from 60 to 90.…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The proposed DBN + HEMA based attack detection model in cloud was implemented in Python and the results were observed. In addition, the betterment of the proposed DBN + HEMA based attack detection was compared over other conventional models like RNN, 47 SVM, 34 KNN 48 and Naive Bayes 34 with respect to the performance metrics like “accuracy, sensitivity, specificity, precision, FPR, F‐measure Recall, and MCC.” Here, the performance analysis was carried out by varying the split ratio that ranges from 60 to 90.…”
Section: Resultsmentioning
confidence: 99%
“…In 2018, Joseph et al 34 have presented malware attacks in cloud storage utilizing VM snapshots on virtual machines for a self‐healing strategy. Since snapshots were often provided as a backup in certain backup servers, such a method would minimize the backup server overhead using the VMs' self‐healing functionality in the local cloud network themselves without compromising any VM in the backup server.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Also, this novel approach needs further investigations in other to conclusively ascertain its advantages. Furthermore, [54] proposed an attack detection method, leveraging on Virtual Machine (VM) memory snapshot analysis. Here, an algorithm using snapshots is used to model an IDS which effectively detects malware and also has the capability to self-heal after an attack.…”
Section: Novel Deception Technologies and Limitationsmentioning
confidence: 99%