A VMM-based intrusion prevention system in cloud computing environment

H Jin, G Xiang, D Zou, S Wu, F Zhao, M Li… - The Journal of …, 2013 - Springer
… to solve the traditional security problems and can be taken as the underlying infrastructure
of cloud computing. In this paper, we propose an intrusion prevention system, VMFence, in a …

VNIDA: Building an IDS architecture using VMM-based non-intrusive approach

X Zhang, Q Li, S Qing, H Zhang - … Discovery and Data Mining …, 2008 - ieeexplore.ieee.org
intrusion detection framework and establish the theoretical foundation for intrusion detection
system … In this paper, we proposed a VMM-based intrusion detection architecture called …

Virtual machine monitor-based lightweight intrusion detection

F Azmandian, M Moffie, M Alshawabkeh, J Dy… - … Operating Systems …, 2011 - dl.acm.org
… we propose a VMM-based IDS, a variant of hostbased intrusion detection systems wherein
the … a prototype of a pure VMM-level intrusion detection system using VirtualBox [15], an open-…

VMGuard: A VMI-based security architecture for intrusion detection in cloud environment

P Mishra, V Varadharajan, ES Pilli… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
… However, an attacker with kernel privileges may send false information and evade detection.
Lycosid [13] is a VMM-based malicious hidden process detection system. It makes use of …

VMM-based hidden process detection and identification using Lycosid

ST Jones, AC Arpaci-Dusseau… - Proceedings of the …, 2008 - dl.acm.org
… a VMM-based hidden process detection and identification service called Lycosid. Previously
proposed VMM-based securitysecurity monitoring services like anomaly detection systems […

On the design of Virtual machine Intrusion detection system

U Tupakula, V Varadharajan - 12th IFIP/IEEE International …, 2011 - ieeexplore.ieee.org
… for developing security tools based on VMM. In this paper, we consider design choices for
comprehensive security architecture and propose a VMM based intrusion detection system to …

Using VMM-based sensors to monitor honeypots

K Asrigo, L Litty, D Lie - Proceedings of the 2nd international conference …, 2006 - dl.acm.org
… of a VMM-based intrusion detection and monitoring system for … intrusion detection system
could be crafted out of the sensor mechanism if combined with a system that can detect

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

A Kumara, CD Jaidhar - Future Generation Computer Systems, 2018 - Elsevier
… -of-VM security solutions. To address the foremost issue, in this paper, we propose an
advanced VMM-based guest-assisted Automated Multilevel Malware Detection System (AMMDS) …

Collabra: a xen hypervisor based collaborative intrusion detection system

S Bharadwaja, W Sun, M Niamat… - 2011 Eighth …, 2011 - ieeexplore.ieee.org
… The individual VMM based IDS module lacks the global view in general, and has difficulty
in identifying the correlations between multiple operations that are part of the correlated attack. …

Sequence-based analysis of static probe instrumentation data for a vmm-based anomaly detection system

AW Paundu, T Okuda, Y Kadobayashi… - … on Cyber Security …, 2016 - ieeexplore.ieee.org
… develop an Anomaly Detection System (ADS) … VMM-based anomaly detection systems
using sequence-based analysis of the 2016 IEEE 3rd International Conference on Cyber Security