Visible to the public To Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing

TitleTo Detect Malware attacks for an Autonomic Self-Heal Approach of Virtual Machines in Cloud Computing
Publication TypeConference Paper
Year of Publication2019
AuthorsJoseph, Linda, Mukesh, Rajeswari
Conference Name2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
PublisherIEEE
ISBN Number978-1-7281-1599-3
KeywordsAPI calls, application program interfaces, attack model, cloud computing, invasive software, learning (artificial intelligence), machine learning algorithms, Malware, malware attacks, Monitoring, Operating systems, private cloud, private cloud environment, pubcrawl, public cloud services, security, security features, Self-Heal, self-heal algorithm, self-heal approach, supervised machine learning techniques, unattacked virtual machine memory snapshots, unsupervised machine, Virtual machine monitors, virtual machine security, virtual machine snapshots, virtual machines, virtual machines memory snapshots API call sequences, Virtual machining
Abstract

Cloud Computing as of large is evolving at a faster pace with an ever changing set of cloud services. The amenities in the cloud are all enabled with respect to the public cloud services in their own enormous domain aspects commercially, which tend to be more insecure. These cloud services should be thus protected and secured which is very vital to the cloud infrastructures. Therefore, in this research work, we have identified security features with a self-heal approach that could be rendered on the infrastructure as a service (IaaS) in a private cloud environment. We have investigated the attack model from the virtual machine snapshots and have analyzed based on the supervised machine learning techniques. The virtual machines memory snapshots API call sequences are considered as input for the supervised and unsupervised machine learning algorithms to classify the attacked and the un-attacked virtual machine memory snapshots. The obtained set of the attacked virtual machine memory snapshots are given as input to the self-heal algorithm which is enabled to retrieve back the functionality of the virtual machines. Our method of detecting the malware attains about 93% of accuracy with respect to the virtual machine snapshots.

URLhttps://ieeexplore.ieee.org/document/8918909
DOI10.1109/ICONSTEM.2019.8918909
Citation Keyjoseph_detect_2019