To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Title | To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Joseph, Linda, Mukesh, Rajeswari |
Conference Name | 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM) |
Publisher | IEEE |
ISBN Number | 978-1-7281-1599-3 |
Keywords | API calls, application program interfaces, attack model, cloud computing, invasive software, learning (artificial intelligence), machine learning algorithms, Malware, malware attacks, Monitoring, Operating systems, private cloud, private cloud environment, pubcrawl, public cloud services, security, security features, Self-Heal, self-heal algorithm, self-heal approach, supervised machine learning techniques, unattacked virtual machine memory snapshots, unsupervised machine, Virtual machine monitors, virtual machine security, virtual machine snapshots, virtual machines, virtual machines memory snapshots API call sequences, Virtual machining |
Abstract | Cloud Computing as of large is evolving at a faster pace with an ever changing set of cloud services. The amenities in the cloud are all enabled with respect to the public cloud services in their own enormous domain aspects commercially, which tend to be more insecure. These cloud services should be thus protected and secured which is very vital to the cloud infrastructures. Therefore, in this research work, we have identified security features with a self-heal approach that could be rendered on the infrastructure as a service (IaaS) in a private cloud environment. We have investigated the attack model from the virtual machine snapshots and have analyzed based on the supervised machine learning techniques. The virtual machines memory snapshots API call sequences are considered as input for the supervised and unsupervised machine learning algorithms to classify the attacked and the un-attacked virtual machine memory snapshots. The obtained set of the attacked virtual machine memory snapshots are given as input to the self-heal algorithm which is enabled to retrieve back the functionality of the virtual machines. Our method of detecting the malware attains about 93% of accuracy with respect to the virtual machine snapshots. |
URL | https://ieeexplore.ieee.org/document/8918909 |
DOI | 10.1109/ICONSTEM.2019.8918909 |
Citation Key | joseph_detect_2019 |
- public cloud services
- Virtual machining
- virtual machines memory snapshots API call sequences
- virtual machines
- virtual machine snapshots
- virtual machine security
- Virtual machine monitors
- unsupervised machine
- unattacked virtual machine memory snapshots
- supervised machine learning techniques
- self-heal approach
- self-heal algorithm
- Self-Heal
- security features
- security
- API calls
- pubcrawl
- private cloud environment
- private cloud
- operating systems
- Monitoring
- malware attacks
- malware
- machine learning algorithms
- learning (artificial intelligence)
- invasive software
- Cloud Computing
- attack model
- application program interfaces