2018 1st International Conference on Data Intelligence and Security (ICDIS) 2018
DOI: 10.1109/icdis.2018.00034
|View full text |Cite
|
Sign up to set email alerts
|

Phase Space Detection of Virtual Machine Cyber Events Through Hypervisor-Level System Call Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 20 publications
0
8
0
Order By: Relevance
“…Most recently, approaches that rely on machine learning techniques have gained traction. The high increase in cloud activity has also called for more attention towards methods that are specific to the cloud environment [1], [5]- [7], [10], [20], [21]. Table I shows some of the closely related work.…”
Section: A Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Most recently, approaches that rely on machine learning techniques have gained traction. The high increase in cloud activity has also called for more attention towards methods that are specific to the cloud environment [1], [5]- [7], [10], [20], [21]. Table I shows some of the closely related work.…”
Section: A Related Workmentioning
confidence: 99%
“…This approach succeeded in detecting highly active malware, but was not successful in detecting low activity malware. Dawson et al [10] fetch API calls through hypervisor to be used as features and use a non linear phase-space algorithm to detect anomalous behavior. Watson et al [1] use performance metrics to build a one class SVC; however, the authors experimented on highly active malware which is easy to detect.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Many research works address the problem of online malware detection using different set of features and machine learning algorithms. Some works [6,8,14] focus on using systems calls while others [3,18,19] focus on using API calls. Others [16,23] focus on using memory features or performance counters [7].…”
Section: Related Workmentioning
confidence: 99%
“…Few works [1,6,17,20,21] exist in the domain of online malware detection in cloud. Typically, machine learning is used in online malware detection.…”
Section: Introductionmentioning
confidence: 99%