Abstract
Cloud computing provides delivery of computing resources as a services pay-as-you-go basis. It represents a shift from products being purchased, to products being subscribed as a service, delivered to consumers over the internet from a large scale data center. The main issue with cloud services is security from attackers who can easily compromise the Virtual Machines (VMs) and applications running over it. In this paper, we present a VMProtector mechanism to detect malign processes which generate attacks against VMs running in cloud. VMProtector extracts the n-grams and applies Principal Component Analysis (PCA) algorithm to select relevant n-gram patterns. It further applies fusion technique using three classifiers Random Forest (RF) and K-Nearest Neighbour (KNN) and Logistic Regression (LR) to learn and detect system call pattern of malign processes. The approach is implemented using University of New Maxico (UNM) dataset and provides promising results.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kumar, S., Goudar, R.: Cloud computing-research issues, challenges, architecture, platforms and applications: a survey. Int. J. Future Comput. Commun. 1(4), 356 (2012)
Oracle: “oracle report” (2018). https://assets.kpmg/content/dam/kpmg/kz/pdf/Oracle-and-KPMG-Cloud-Threat-Report_2018_Limited.pdf
Singh, A., Shrivastava, D.M.: Overview of attacks on cloud computing. Int. J. Eng. Innovative Technol. (IJEIT) 1(4) (2012)
Kumar, V., Sangwan, O.P.: Signature based intrusion detection system using snort. Int. J. Comput. Appl. Inf. Technol. 1(3), 35–41 (2012)
Jain, M., Bajaj, P.: Techniques in detection and analyzing malware executables: a review. Int. J. Comput. Sci. Mobile Comput. 3(5), 930–935 (2014)
Song, F., Guo, Z., Mei, D.: Feature selection using principal component analysis. In: International Conference on System Science, Engineering Design and Manufacturing Informatization, vol. 1, pp. 27–30. IEEE (2010)
Biau, G.: Analysis of a random forests model. J. Mach. Learn. Res. 13(Apr), 1063–1095 (2012)
Bijalwan, V., Kumar, V., Kumari, P., Pascual, J.: KNN based machine learning approach for text and document mining. Int. J. Database Theory Appl. 7(1), 61–70 (2014)
Hosmer Jr., D.W., Lemeshow, S., Sturdivant, R.X.: Applied Logistic Regression, vol. 398. Wiley, Hoboken (2013)
Mishra, P., Pilli, E.S., Varadharajan, V., Tupakula, U.: Securing virtual machines from anomalies using program-behavior analysis in cloud environment. In: IEEE 18th International Conference on High Performance Computing and Communications, pp. 991–998. IEEE (2016)
Alarifi, S., Wolthusen, S.: Anomaly detection for ephemeral cloud IaaS virtual machines. In: Lopez, J., Huang, X., Sandhu, R. (eds.) NSS 2013. LNCS, vol. 7873, pp. 321–335. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-38631-2_24
Dinaburg, A., Royal, P., Sharif, M., Lee, W.: Ether: malware analysis via hardware virtualization extensions. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, pp. 51–62. ACM (2008)
Gupta, S., Kumar, P.: An immediate system call sequence based approach for detecting malicious program executions in cloud environment. Wireless Pers. Commun. 81(1), 405–425 (2015)
Deshpande, P., Sharma, S., Peddoju, S., Junaid, S.: Hids: a host based intrusion detection system for cloud computing environment. Int. J. Syst. Assur. Eng. Manag. 9(3), 567–576 (2018)
Phalke, N.N., Adagale, S.S., Priyadarshi, A., Shinde, V.B.: Malware detection using n-gram based file signature based method. Int. J. Recent Innovation Trends Comput. Commun. 2(11), 3793–3795 (2014)
UNM: UNM Dataset (1998). http://www.cs.unm.edu/~immsec/systemcalls.htm
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Mishra, P., Negi, A., Pilli, E.S., Joshi, R.C. (2019). VMProtector: Malign Process Detection for Protecting Virtual Machines in Cloud Environment. In: Singh, M., Gupta, P., Tyagi, V., Flusser, J., Ören, T., Kashyap, R. (eds) Advances in Computing and Data Sciences. ICACDS 2019. Communications in Computer and Information Science, vol 1045. Springer, Singapore. https://doi.org/10.1007/978-981-13-9939-8_32
Download citation
DOI: https://doi.org/10.1007/978-981-13-9939-8_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-9938-1
Online ISBN: 978-981-13-9939-8
eBook Packages: Computer ScienceComputer Science (R0)