Detection of Malware and Kernel-level Rootkits in Cloud Computing Environments

被引:8
作者
Win, Thu Yein [1 ]
Tianfield, Huaglory [1 ]
Mair, Quentin [1 ]
机构
[1] Glasgow Caledonian Univ, Sch Engn & Built Environm, Cloud & Data Lab, Glasgow G4 0BA, Lanark, Scotland
来源
2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD) | 2015年
关键词
virtualization security; cloud security; malware detection; rootkit detection; support vector machine; virtual machine introspection;
D O I
10.1109/CSCloud.2015.54
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has become increasingly sophisticated. This paper presents a novel malware and rookit detection system which protects the guests against different attacks. It combines system call monitoring and system call hashing on the guest kernel together with Support Vector Machines (SVM)-based external monitoring on the host. We demonstrate the effectiveness of our solution by evaluating it against well-known user-level malware as well as kernel-level rootkit attacks.
引用
收藏
页码:295 / 300
页数:6
相关论文
共 50 条
  • [41] A Visual Analytics Framework for Explainable Malware Detection in Edge Computing Networks
    Uysal, Dilara T.
    Naser, Shimaa
    Almahmoud, Zaid
    Muhaidat, Sami
    Yoo, Paul D.
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5159 - 5164
  • [42] A Virtual Network Guard System Based on Cloud Computing Environments
    He, Bing-Zhe
    Huang, Kuan-Ling
    Sun, Hung-Min
    Tso, Raylin
    GENETIC AND EVOLUTIONARY COMPUTING, 2015, 329 : 361 - 370
  • [43] Intrusion Detection Techniques Analysis in Cloud Computing
    Qi, Wuqi
    Wu, Wei
    Wang, Hao
    Ou, Lu
    Hu, Ning
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 360 - 363
  • [44] An Adaptive Intrusion Detection Scheme for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    INTERNATIONAL JOURNAL OF SWARM INTELLIGENCE RESEARCH, 2019, 10 (04) : 53 - 70
  • [45] A Distributed Intrusion Detection Scheme for Cloud Computing
    Ibrahim, Nurudeen Mahmud
    Zainal, Anazida
    INTERNATIONAL JOURNAL OF DISTRIBUTED SYSTEMS AND TECHNOLOGIES, 2020, 11 (01) : 68 - 82
  • [46] Machine Learning Based Obfuscated Malware Detection in the Cloud Environment with Nature-Inspired Feature Selection
    Ghazi, Mohd. Rehan
    Raghava, N. S.
    2022 5TH INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES (IMPACT), 2022,
  • [47] Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues
    Shamshirband, Shahab
    Fathi, Mahdis
    Chronopoulos, Anthony T.
    Montieri, Antonio
    Palumbo, Fabio
    Pescape, Antonio
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [48] A multi-level deep learning system for malware detection
    Zhong, Wei
    Gu, Feng
    EXPERT SYSTEMS WITH APPLICATIONS, 2019, 133 : 151 - 162
  • [49] ANDROID MALWARE DETECTION USING 3-LEVEL ENSEMBLE
    Ouyang, Linshu
    Dong, Feng
    Zhang, Miao
    PROCEEDINGS OF 2016 4TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (IEEE CCIS 2016), 2016, : 393 - 397
  • [50] Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments
    Nahmias, Daniel
    Cohen, Aviad
    Nissim, Nir
    Elovici, Yuval
    NEURAL NETWORKS, 2020, 124 : 243 - 257