2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) 2019
DOI: 10.1109/iconstem.2019.8918909
|View full text |Cite
|
Sign up to set email alerts
|

To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 24 publications
0
2
0
Order By: Relevance
“…SVM can be trained on historical data to identify patterns and predict future behaviour. SVM was described by [39] as a set of supervised prediction-learning methods that are used for classification and regression. The technique uses machine-learning theory to maximise the predicting accuracy of an anomaly on cyber-physical systems.…”
Section: Support Vector Machinementioning
confidence: 99%
See 3 more Smart Citations
“…SVM can be trained on historical data to identify patterns and predict future behaviour. SVM was described by [39] as a set of supervised prediction-learning methods that are used for classification and regression. The technique uses machine-learning theory to maximise the predicting accuracy of an anomaly on cyber-physical systems.…”
Section: Support Vector Machinementioning
confidence: 99%
“…The algorithm supports empirical performance and the structure risk minimisation (SRM) principle. SRM is argued by [39] to be superior to the traditional empirical risk minimisation (ERM) principle. SVM uses statistical-learning theories to study the problems of knowledge gain, predictions, and decision-making for a given dataset.…”
Section: Support Vector Machinementioning
confidence: 99%
See 2 more Smart Citations
“…ML-based methods have been proposed to fight against co-resident attacks focusing on different factors, such as minimizing the time of a malicious VM co-location. Joseph et al [36] used traditional ML algorithms, such as support vector machine (SVM), naïve bayes, and random forests to detect malware, following a self-healing methodology to power off the attacked VMs and restore them to healthy conditions. In reality, there is a concern with the amount of time it takes to implement a solution to mitigate VMs in the event of co-resident attacks.…”
Section: Related Work: Secure Cloud Resource Managementmentioning
confidence: 99%