2020
DOI: 10.1016/j.jisa.2020.102460
|View full text |Cite
|
Sign up to set email alerts
|

KVMInspector: KVM Based introspection approach to detect malware in cloud environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 15 publications
0
16
0
1
Order By: Relevance
“…In the comparative analysis section, the proposed methodology is compared with state-of-art techniques such as VMGuard, 9 RNN, 32 deep RNN and metaheuristic feature selection, 33 and KVM inspector. 34 These techniques also include cloud-based IDSs that take account of the statistical meta-features. The comparative analysis of the proposed technique F I G U R E 5 Analyzing the performance in terms of false alarm rate…”
Section: Comparative Analysismentioning
confidence: 99%
“…In the comparative analysis section, the proposed methodology is compared with state-of-art techniques such as VMGuard, 9 RNN, 32 deep RNN and metaheuristic feature selection, 33 and KVM inspector. 34 These techniques also include cloud-based IDSs that take account of the statistical meta-features. The comparative analysis of the proposed technique F I G U R E 5 Analyzing the performance in terms of false alarm rate…”
Section: Comparative Analysismentioning
confidence: 99%
“…Due to the lack of public dataset, they collected dataset from a production environment of cloud service provider to train their IDS model. Mishra (2020) 17 has proposed KVMInspector which is a VMI based malware detection system for cloud. They used machine learning algorithms with ensemble heterogeneous classifiers for the detection of malware inside VM from the hypervisor.…”
Section: Existing Workmentioning
confidence: 99%
“…Previously, Virtual Machine Introspection (VMI) was used in dynamic malware analysis 15 . Recently, VMI technique is used in IDS development also to detect intrusions at Virtual Machines (VM) of cloud 16‐18 . A Hypervisor or Virtual Machine Monitor (VMM) is responsible for managing virtual machines and other resources of cloud computing.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Figure 4 presents the design of the AMD architecture. Mishra et al [31] proposed a dynamic evaluation-based introspection technique, named KVMInspector for malware detection in KVM-based cloud environment. Libraries of LibVMI and Nitro were utilized in extracting the reduced level information of a running virtual machine by checking its memory, trapping hardware events, as well as evaluating the vCPU registers from KVM.…”
Section: Malware Detection Techniques In Hardwarementioning
confidence: 99%