Please use this identifier to cite or link to this item: https://hdl.handle.net/1959.11/56746
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMishra, Preetien
dc.contributor.authorPilli, Emmanuel Sen
dc.contributor.authorVaradharajan, Vijayen
dc.contributor.authorTupakula, Udayaen
dc.date.accessioned2023-11-27T08:50:47Z-
dc.date.available2023-11-27T08:50:47Z-
dc.date.issued2017-03-29-
dc.identifier.citationJournal of Intelligent & Fuzzy Systems, 32(4), p. 2909-2921en
dc.identifier.issn1875-8967en
dc.identifier.issn1064-1246en
dc.identifier.urihttps://hdl.handle.net/1959.11/56746-
dc.description.abstract<p>Cloud Security is of paramount importance in the new era of virtualization technology. Tenant Virtual Machine (VM) level security solutions can be easily evaded by modern attack techniques. Out-VM monitoring allows cloud administrator (CA) to monitor and control a VM from a secure location outside the VM. In this paper, we propose an out-VM monitoring based approach named as ‘<b>P</b>rogram <b>S</b>emantic-Aware <b>I</b>ntrusion Detection at <b>Net</b>work and Hyper<b>visor</b> Layer’ (<i>PSI-NetVisor</i>) to detect attacks in both network and virtualization layer in cloud. <i>PSI-NetVisor</i> performs network monitoring by employing behavior based intrusion detection approach (BIDA) at the network layer of centralized Cloud Network Server (CNS); providing the first level of defense from attacks. It incorporates semantic awareness in the intrusion detection approach and enables it to provide network monitoring and process monitoring at the hypervisor layer of Cloud Compute Server (CCoS); providing the second level of defense from attacks. <i>PSI-NetVisor</i> employs Virtual Machine Introspection (VMI) libraries based on software break point injection to extract process execution traces from hypervisor. It further applies depth first search (DFS) to construct program semantics from control flow graph of execution traces. It applies dynamic analysis and machine learning approaches to learn the behavior of anomalies which makes it secure from obfuscation and encryption based attacks. <i>PSI-NetVisor</i> has been validated with latest intrusion datasets (UNSW-NB & Evasive Malware) collected from research centers and results seem to be promising.</p>en
dc.languageenen
dc.publisherIOS Pressen
dc.relation.ispartofJournal of Intelligent & Fuzzy Systemsen
dc.titlePSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in clouden
dc.typeJournal Articleen
dc.identifier.doi10.3233/JIFS-169234en
local.contributor.firstnamePreetien
local.contributor.firstnameEmmanuel Sen
local.contributor.firstnameVijayen
local.contributor.firstnameUdayaen
local.profile.schoolSchool of Science & Technologyen
local.profile.emailutupakul@une.edu.auen
local.output.categoryC1en
local.record.placeauen
local.record.institutionUniversity of New Englanden
local.publisher.placeThe Netherlandsen
local.format.startpage2909en
local.format.endpage2921en
local.peerreviewedYesen
local.identifier.volume32en
local.identifier.issue4en
local.title.subtitleProgram semantic aware intrusion detection at network and hypervisor layer in clouden
local.contributor.lastnameMishraen
local.contributor.lastnamePillien
local.contributor.lastnameVaradharajanen
local.contributor.lastnameTupakulaen
dc.identifier.staffune-id:utupakulen
local.profile.orcid0000-0001-5048-9797en
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.profile.roleauthoren
local.identifier.unepublicationidune:1959.11/56746en
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
dc.identifier.academiclevelAcademicen
local.title.maintitlePSI-NetVisoren
local.output.categorydescriptionC1 Refereed Article in a Scholarly Journalen
local.search.authorMishra, Preetien
local.search.authorPilli, Emmanuel Sen
local.search.authorVaradharajan, Vijayen
local.search.authorTupakula, Udayaen
local.open.fileurlhttps://rune.une.edu.au/web/retrieve/813e0c06-b4a8-4b9c-8d03-5184789bfd44en
local.uneassociationNoen
local.atsiresearchNoen
local.sensitive.culturalNoen
local.year.published2017en
local.fileurl.openhttps://rune.une.edu.au/web/retrieve/813e0c06-b4a8-4b9c-8d03-5184789bfd44en
local.fileurl.closedpublishedhttps://rune.une.edu.au/web/retrieve/813e0c06-b4a8-4b9c-8d03-5184789bfd44en
local.subject.for2020460407 System and network securityen
local.subject.seo2020220405 Cybersecurityen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
local.profile.affiliationtypeExternal Affiliationen
Appears in Collections:Journal Article
School of Science and Technology
Files in This Item:
1 files
File SizeFormat 
Show simple item record

SCOPUSTM   
Citations

17
checked on Jan 11, 2025
Google Media

Google ScholarTM

Check

Altmetric


Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.