Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/56746
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mishra, Preeti | en |
dc.contributor.author | Pilli, Emmanuel S | en |
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Tupakula, Udaya | en |
dc.date.accessioned | 2023-11-27T08:50:47Z | - |
dc.date.available | 2023-11-27T08:50:47Z | - |
dc.date.issued | 2017-03-29 | - |
dc.identifier.citation | Journal of Intelligent & Fuzzy Systems, 32(4), p. 2909-2921 | en |
dc.identifier.issn | 1875-8967 | en |
dc.identifier.issn | 1064-1246 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/56746 | - |
dc.description.abstract | <p>Cloud Security is of paramount importance in the new era of virtualization technology. Tenant Virtual Machine (VM) level security solutions can be easily evaded by modern attack techniques. Out-VM monitoring allows cloud administrator (CA) to monitor and control a VM from a secure location outside the VM. In this paper, we propose an out-VM monitoring based approach named as ‘<b>P</b>rogram <b>S</b>emantic-Aware <b>I</b>ntrusion Detection at <b>Net</b>work and Hyper<b>visor</b> Layer’ (<i>PSI-NetVisor</i>) to detect attacks in both network and virtualization layer in cloud. <i>PSI-NetVisor</i> performs network monitoring by employing behavior based intrusion detection approach (BIDA) at the network layer of centralized Cloud Network Server (CNS); providing the first level of defense from attacks. It incorporates semantic awareness in the intrusion detection approach and enables it to provide network monitoring and process monitoring at the hypervisor layer of Cloud Compute Server (CCoS); providing the second level of defense from attacks. <i>PSI-NetVisor</i> employs Virtual Machine Introspection (VMI) libraries based on software break point injection to extract process execution traces from hypervisor. It further applies depth first search (DFS) to construct program semantics from control flow graph of execution traces. It applies dynamic analysis and machine learning approaches to learn the behavior of anomalies which makes it secure from obfuscation and encryption based attacks. <i>PSI-NetVisor</i> has been validated with latest intrusion datasets (UNSW-NB & Evasive Malware) collected from research centers and results seem to be promising.</p> | en |
dc.language | en | en |
dc.publisher | IOS Press | en |
dc.relation.ispartof | Journal of Intelligent & Fuzzy Systems | en |
dc.title | PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud | en |
dc.type | Journal Article | en |
dc.identifier.doi | 10.3233/JIFS-169234 | en |
local.contributor.firstname | Preeti | en |
local.contributor.firstname | Emmanuel S | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Udaya | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | C1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | The Netherlands | en |
local.format.startpage | 2909 | en |
local.format.endpage | 2921 | en |
local.peerreviewed | Yes | en |
local.identifier.volume | 32 | en |
local.identifier.issue | 4 | en |
local.title.subtitle | Program semantic aware intrusion detection at network and hypervisor layer in cloud | en |
local.contributor.lastname | Mishra | en |
local.contributor.lastname | Pilli | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Tupakula | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/56746 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | PSI-NetVisor | en |
local.output.categorydescription | C1 Refereed Article in a Scholarly Journal | en |
local.search.author | Mishra, Preeti | en |
local.search.author | Pilli, Emmanuel S | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Tupakula, Udaya | en |
local.open.fileurl | https://rune.une.edu.au/web/retrieve/813e0c06-b4a8-4b9c-8d03-5184789bfd44 | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2017 | en |
local.fileurl.open | https://rune.une.edu.au/web/retrieve/813e0c06-b4a8-4b9c-8d03-5184789bfd44 | en |
local.fileurl.closedpublished | https://rune.une.edu.au/web/retrieve/813e0c06-b4a8-4b9c-8d03-5184789bfd44 | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Journal Article School of Science and Technology |
Files in This Item:
File | Size | Format |
---|
SCOPUSTM
Citations
17
checked on Jan 11, 2025
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.