Joseph et al., 2019 - Google Patents
To detect malware attacks for an autonomic self-heal approach of virtual machines in cloud computingJoseph et al., 2019
View PDF- Document ID
- 4490091360198097190
- Author
- Joseph L
- Mukesh R
- Publication year
- Publication venue
- 2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)
External Links
Snippet
Cloud Computing as of large is evolving at a faster pace with an ever changing set of cloud services. The amenities in the cloud are all enabled with respect to the public cloud services in their own enormous domain aspects commercially, which tend to be more insecure …
- 240000001816 Prunella vulgaris 0 title abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/561—Virus type analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/568—Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Similar Documents
Publication | Publication Date | Title |
---|---|---|
El Kafhali et al. | Security threats, defense mechanisms, challenges, and future directions in cloud computing | |
Mishra et al. | Intrusion detection techniques in cloud environment: A survey | |
US11347843B2 (en) | Asset-based security systems and methods | |
Araujo et al. | From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation | |
EP2774038B1 (en) | Systems and methods for virtualization and emulation assisted malware detection | |
US8572735B2 (en) | Attack resistant continuous network service trustworthiness controller | |
Tank et al. | Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison | |
Mishra et al. | VMShield: Memory introspection-based malware detection to secure cloud-based services against stealthy attacks | |
Shan et al. | Malware clearance for secure commitment of OS-level virtual machines | |
Roy et al. | Secure the cloud: From the perspective of a service-oriented organization | |
Srivastava et al. | Automatic discovery of parasitic malware | |
Mishra et al. | VAED: VMI‐assisted evasion detection approach for infrastructure as a service cloud | |
US20220237285A1 (en) | Cyber immunity system as a biological self-recognition model on operating systems | |
Abed et al. | Resilient intrusion detection system for cloud containers | |
Joseph et al. | Detection of malware attacks on virtual machines for a self-heal approach in cloud computing using VM snapshots | |
Di Pietro et al. | CloRExPa: Cloud resilience via execution path analysis | |
Pitropakis et al. | Till all are one: Towards a unified cloud IDS | |
Fischer et al. | CloudIDEA: a malware defense architecture for cloud data centers | |
Joseph et al. | To detect malware attacks for an autonomic self-heal approach of virtual machines in cloud computing | |
Anagnostakis et al. | Shadow honeypots | |
Lombardi et al. | Virtualization and cloud security: Benefits, caveats, and future developments | |
Zhang et al. | A survey on security of cloud environment: threats, solutions, and innovation | |
Xie et al. | Lightweight examination of dll environments in virtual machines to detect malware | |
AT&T | ||
Singh et al. | A review on intrusion detection approaches in cloud security systems |