Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/57293
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mishra, Preeti | en |
dc.contributor.author | Pilli, Emmanuel S | en |
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Tupakula, Udaya | en |
dc.date.accessioned | 2024-01-12T04:11:11Z | - |
dc.date.available | 2024-01-12T04:11:11Z | - |
dc.date.issued | 2016 | - |
dc.identifier.citation | Proceedings - 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS), p. 991-998 | en |
dc.identifier.isbn | 9781509042975 | en |
dc.identifier.isbn | 9781509042982 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/57293 | - |
dc.description.abstract | <p>Cloud Computing is the key technology of today's cyber world which provides online provisioning of resources on demand and pay per use basis. Malware attacks such as virus, worm and rootkits etc. are some threats to virtual machines (VMs) in cloud environment. In this paper, we present a system call analysis approach to detect malware attacks which maliciously affect the legitimate programs running in Virtual Machines (VMs) and modify their behavior. Our approach is named as 'Malicious System Call Sequence Detection (MSCSD)' which is based on analysis of short sequence of system calls (n-grams). MSCSD employs an efficient feature representation method for system call patterns to improve the accuracy of attack detection and reduce the cost of storage with reduced false positives. MSCSD applies Machine Learning (Decision Tree C 4.5) over the collected n-gram patterns for learning the behavior of monitored programs and detecting malicious system call patterns in future. We have analyzed the performance of some other classifiers and compared our work with the existing work for securing virtual machine in cloud. A prototype implementation of the approach is carried out over UNM dataset and results seem to be promising.</p> | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | en |
dc.relation.ispartof | Proceedings - 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS) | en |
dc.title | Securing virtual machines from anomalies using program-behavior analysis in cloud environment | en |
dc.type | Conference Publication | en |
dc.relation.conference | 18th IEEE International Conference on High Performance Computing and Communications (HPCC 2016) | en |
dc.identifier.doi | 10.1109/HPCC-SmartCity-DSS.2016.0141 | en |
local.contributor.firstname | Preeti | en |
local.contributor.firstname | Emmanuel S | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Udaya | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | E1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.conference.place | Sydney, Australia | en |
local.publisher.place | United States of America | en |
local.format.startpage | 991 | en |
local.format.endpage | 998 | en |
local.peerreviewed | Yes | en |
local.contributor.lastname | Mishra | en |
local.contributor.lastname | Pilli | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Tupakula | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/57293 | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Securing virtual machines from anomalies using program-behavior analysis in cloud environment | en |
local.output.categorydescription | E1 Refereed Scholarly Conference Publication | en |
local.conference.details | 18th IEEE International Conference on High Performance Computing and Communications (HPCC 2016), Sydney, Australia | en |
local.search.author | Mishra, Preeti | en |
local.search.author | Pilli, Emmanuel S | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Tupakula, Udaya | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.published | 2016 | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.date.start | 2016-12-12 | - |
local.date.end | 2016-12-14 | - |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
Appears in Collections: | Conference Publication School of Science and Technology |
SCOPUSTM
Citations
21
checked on Jan 4, 2025
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.