2013 IEEE Conference on Communications and Network Security (CNS) 2013
DOI: 10.1109/cns.2013.6682703
|View full text |Cite
|
Sign up to set email alerts
|

A cooperative botnet profiling and detection in virtualized environment

Abstract: Abstract-Cloud security becomes an important topic in recent years, as to overcome the botnet in a virtualized environment is a critical task for the cloud providers. Although numerous intrusion detection systems are available, yet it is not practical to install IDS in every virtual machine. In this paper, we argue that a virtual machine monitor (VMM) can support certain security functions that our proposed design can actively collect information directly from the VMM without installing an agent in the guest O… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…Their study also shows that these bots mostly infect countries in Europe and America. Supporting this is [5], which further proves the effectiveness of behaviourbased detection systems. On a virtual machine (VM), a detection agent is installed, which monitors the processes and their spawned processes to build a behaviour profile and bot process activity log(s).…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 52%
See 3 more Smart Citations
“…Their study also shows that these bots mostly infect countries in Europe and America. Supporting this is [5], which further proves the effectiveness of behaviourbased detection systems. On a virtual machine (VM), a detection agent is installed, which monitors the processes and their spawned processes to build a behaviour profile and bot process activity log(s).…”
Section: Machine Learning and Network-based Detection Mechanismsmentioning
confidence: 52%
“…At the network level, removal of malware can be performed by agents installed locally or by the use of a continuous communication protocol with a master device. This validates of the integrity of local hosts and allows administrators to perform removal of botnet-enabling malware from hosts, either automatically or manually [5,176,205].…”
Section: Network-level Blocking and Packet Analysismentioning
confidence: 84%
See 2 more Smart Citations
“…In contrast, the horizontal similarity index or HSI aims to find similarities amongst different mobile devices activities in a network. The Jaccard Index metric shown in formula 4 is employed by both vertical and horizontal indexes to measure the level of similarities in the history of single device along with similarities of group of mobile devices [26].…”
Section: Horizontal and Vertical Similarity Index (Hsi Vsi)mentioning
confidence: 99%