Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/57098
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mishra, Preeti | en |
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Pilli, Emmanuel S | en |
dc.contributor.author | Tupakula, Uday | en |
dc.date.accessioned | 2024-01-02T02:36:40Z | - |
dc.date.available | 2024-01-02T02:36:40Z | - |
dc.date.issued | 2020-09 | - |
dc.identifier.citation | IEEE Transactions on Cloud Computing, 8(3), p. 957-971 | en |
dc.identifier.issn | 2168-7161 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/57098 | - |
dc.description.abstract | <p>Cloud security is of paramount importance in the new era of computing. Advanced malware can hide their behavior on detection of the presence of a security tool at a tenant virtual machine (TVM). Hence, TVM-layer security solutions are not reliable. In this paper, we propose a Virtual Machine Introspection (VMI) based security architecture design for fine granular monitoring of the virtual machines to detect known attacks and their variants. We have developed techniques for monitoring the TVMs at the process level and system call level to detect attacks such as those based on malicious hidden processes, attacks that disable security tools in the virtual machines and attacks that alter the behavior of legitimate applications to access sensitive data. Our architecture, VMGuard, utilizes the introspection feature at the VMM-layer to analyze system call traces of programs running on TVM. VMGuard applies the software breakpoint injection technique which is OS agnostic and can be used to trap the execution of programs. Motivated by text mining approaches, VMGuard provides `Bag of n-grams (BonG)' approach integrated with Term Frequency-Inverse Document Frequency (TF-IDF) method, to extract and select features of normal and attack traces. It then applies the Random Forest classifier to produce a generic behavior for different categories of intrusions of the monitored TVM. We have implemented a prototype and conducted a detailed analysis using University of New Mexico (UNM) datasets and a Windows malware dataset obtained from the University of California. The results obtained are promising and demonstrate the applicability of the VMGuard. We compare VMGuard with existing techniques and discuss its advantages.</p> | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers | en |
dc.relation.ispartof | IEEE Transactions on Cloud Computing | en |
dc.title | VMGuard: A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment | en |
dc.type | Journal Article | en |
dc.identifier.doi | 10.1109/TCC.2018.2829202 | en |
local.contributor.firstname | Preeti | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Emmanuel S | en |
local.contributor.firstname | Uday | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | C1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | United States of America | en |
local.format.startpage | 957 | en |
local.format.endpage | 971 | en |
local.peerreviewed | Yes | en |
local.identifier.volume | 8 | en |
local.identifier.issue | 3 | en |
local.title.subtitle | A VMI-Based Security Architecture for Intrusion Detection in Cloud Environment | en |
local.contributor.lastname | Mishra | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Pilli | en |
local.contributor.lastname | Tupakula | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/57098 | en |
local.date.onlineversion | 2018-04-20 | - |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | VMGuard | en |
local.output.categorydescription | C1 Refereed Article in a Scholarly Journal | en |
local.search.author | Mishra, Preeti | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Pilli, Emmanuel S | en |
local.search.author | Tupakula, Uday | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.available | 2018 | en |
local.year.published | 2020 | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Journal Article School of Science and Technology |
SCOPUSTM
Citations
68
checked on Jul 6, 2024
Page view(s)
184
checked on May 5, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.