2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.113
|View full text |Cite
|
Sign up to set email alerts
|

Constructing a Cloud-Based IDS by Merging VMI with FMA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 14 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…To this end, researchers have focused on leveraging properties of virtualization technology as security features. Forensic Memory Analysis (FMA) [13] utilizes VMI to pull information from memory of guest VMs through VMM, then generates high-level semantics (e.g. active processes, loaded kernel modules, system calls and network connections etc.)…”
Section: Forensic Memory Analysismentioning
confidence: 99%
“…To this end, researchers have focused on leveraging properties of virtualization technology as security features. Forensic Memory Analysis (FMA) [13] utilizes VMI to pull information from memory of guest VMs through VMM, then generates high-level semantics (e.g. active processes, loaded kernel modules, system calls and network connections etc.)…”
Section: Forensic Memory Analysismentioning
confidence: 99%
“…In addition, it can be difficult to introspect processes which are mapped across different locations in memory. [9] incorporated VMI with forensic memory analysis (FMA) and machine learning to implement a malware detection scheme. It monitors the guest VM's memory activities over a period of time.…”
Section: Signature-based Detection Using Vmimentioning
confidence: 99%
“…Path-breaking applications of VMI have been developed in relation to cloud security, cloud intrusion detection and cloud access management. There are evidences of intrusion detection systems and rootkit detection methods which have been proved effective only because of use of VMI in their implementation [4][5][6].…”
Section: Introductionmentioning
confidence: 99%