[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Joseph et al., 2019 - Google Patents

To detect malware attacks for an autonomic self-heal approach of virtual machines in cloud computing

Joseph et al., 2019

View PDF
Document ID
4490091360198097190
Author
Joseph L
Mukesh R
Publication year
Publication venue
2019 Fifth International Conference on Science Technology Engineering and Mathematics (ICONSTEM)

External Links

Snippet

Cloud Computing as of large is evolving at a faster pace with an ever changing set of cloud services. The amenities in the cloud are all enabled with respect to the public cloud services in their own enormous domain aspects commercially, which tend to be more insecure …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/561Virus type analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action

Similar Documents

Publication Publication Date Title
El Kafhali et al. Security threats, defense mechanisms, challenges, and future directions in cloud computing
Mishra et al. Intrusion detection techniques in cloud environment: A survey
US11347843B2 (en) Asset-based security systems and methods
Araujo et al. From patches to honey-patches: Lightweight attacker misdirection, deception, and disinformation
EP2774038B1 (en) Systems and methods for virtualization and emulation assisted malware detection
US8572735B2 (en) Attack resistant continuous network service trustworthiness controller
Tank et al. Virtualization vulnerabilities, security issues, and solutions: a critical study and comparison
Mishra et al. VMShield: Memory introspection-based malware detection to secure cloud-based services against stealthy attacks
Shan et al. Malware clearance for secure commitment of OS-level virtual machines
Roy et al. Secure the cloud: From the perspective of a service-oriented organization
Srivastava et al. Automatic discovery of parasitic malware
Mishra et al. VAED: VMI‐assisted evasion detection approach for infrastructure as a service cloud
US20220237285A1 (en) Cyber immunity system as a biological self-recognition model on operating systems
Abed et al. Resilient intrusion detection system for cloud containers
Joseph et al. Detection of malware attacks on virtual machines for a self-heal approach in cloud computing using VM snapshots
Di Pietro et al. CloRExPa: Cloud resilience via execution path analysis
Pitropakis et al. Till all are one: Towards a unified cloud IDS
Fischer et al. CloudIDEA: a malware defense architecture for cloud data centers
Joseph et al. To detect malware attacks for an autonomic self-heal approach of virtual machines in cloud computing
Anagnostakis et al. Shadow honeypots
Lombardi et al. Virtualization and cloud security: Benefits, caveats, and future developments
Zhang et al. A survey on security of cloud environment: threats, solutions, and innovation
Xie et al. Lightweight examination of dll environments in virtual machines to detect malware
AT&T
Singh et al. A review on intrusion detection approaches in cloud security systems