Intelligent behavior-based malware detection system on cloud computing environment

Ö Aslan, M Ozkan-Okay, D Gupta - IEEE Access, 2021 - ieeexplore.ieee.org
These days, cloud computing is one of the most promising technologies to store information
and provide services online efficiently. Using this rapidly developing technology to protect …

MDCHD: A novel malware detection method in cloud using hardware trace and deep learning

D Tian, Q Ying, X Jia, R Ma, C Hu, W Liu - Computer Networks, 2021 - Elsevier
With the development of cloud computing, more and more enterprises and institutes have
deployed important computing tasks and data into virtualization environments. Virtualization …

Kernel-level rootkit detection, prevention and behavior profiling: a taxonomy and survey

M Nadim, W Lee, D Akopian - arXiv preprint arXiv:2304.00473, 2023 - arxiv.org
One of the most elusive types of malware in recent times that pose significant challenges in
the computer security system is the kernel-level rootkits. The kernel-level rootkits can hide its …

Cloud-BlackBox: Toward practical recording and tracking of VM swarms for multifaceted cloud inspection

SH Choi, KW Park - Future Generation Computer Systems, 2022 - Elsevier
Given the widening scope of the utilization and application of cloud computing services from
general to mission-critical systems such as strategic military, financial, and the information …

MinCloud: Trusted and transferable MinHash-based framework for unknown malware detection for Linux cloud environments

T Panker, A Cohen, T Landman, C Bery… - Journal of Information …, 2024 - Elsevier
Linux clouds have become an attractive target for cyber-attacks. However, existing detection
solutions for Linux clouds have variety of limitations. Some of the solutions are untrusted …

Cloud computing threats classification model based on the detection feasibility of machine learning algorithms

Z Masetic, K Hajdarevic, N Dogru - 2017 40th International …, 2017 - ieeexplore.ieee.org
Cloud computing became very popular in past few years, and most of the business and
home users rely on its services. Because of its wide usage, cloud computing services …

DeMETER in clouds: detection of malicious external thread execution in runtime with machine learning in PaaS clouds

MT Sandıkkaya, Y Yaslan, CD Özdemir - Cluster Computing, 2020 - Springer
Current state of PaaS allows rapid outsourcing of web applications without noticeable
configuration effort. It could be foreseen that a noteworthy security guarantee in this cloud …

Nonvolatile kernel rootkit detection using cross‐view clean boot in cloud computing

R Geetha Ramani… - … and Computation: Practice …, 2021 - Wiley Online Library
Malware attacks on kernel rootkits have become increasingly sophisticated and extremely
difficult to detect; hence, they have a reign of power over the functionalities of the kernel …

Data encryption scheme for large data scale in cloud computing

ME Manaa - Journal of Telecommunication, Electronic and …, 2017 - jtec.utem.edu.my
Cloud computing is a power full platform to deliver applications over the internet or a private
network. It considers the next technology in data manipulating and retrieving. These …

Training network managers in ethical hacking techniques to manage resource starvation attacks using GNS3 simulator

K Hajdarevic, A Kozic, I Avdagic… - 2017 XXVI …, 2017 - ieeexplore.ieee.org
The threat of resource starvation attacks is one of the major problems for the e-Business.
More recently these attacks became threats for Cloud environments and Denial of Service is …