2019 Twelfth International Conference on Contemporary Computing (IC3) 2019
DOI: 10.1109/ic3.2019.8844877
|View full text |Cite
|
Sign up to set email alerts
|

VMAnalyzer: Malware Semantic Analysis using Integrated CNN and Bi-Directional LSTM for Detecting VM-level Attacks in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 21 publications
(12 citation statements)
references
References 6 publications
0
12
0
Order By: Relevance
“…As such, recent research efforts have moved towards employing end-to-end deep learning techniques to bypass the feature engineering step. Many research works [8], [20], [19], [21], [23], [22], [24] aimed to overcome the limitations of traditional ML approaches and employed DL algorithms. The works in [21], [23], [22], [24] provide malware detection methods based on system calls and RNN.…”
Section: A Dynamic Malware Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…As such, recent research efforts have moved towards employing end-to-end deep learning techniques to bypass the feature engineering step. Many research works [8], [20], [19], [21], [23], [22], [24] aimed to overcome the limitations of traditional ML approaches and employed DL algorithms. The works in [21], [23], [22], [24] provide malware detection methods based on system calls and RNN.…”
Section: A Dynamic Malware Detectionmentioning
confidence: 99%
“…Many research works [8], [20], [19], [21], [23], [22], [24] aimed to overcome the limitations of traditional ML approaches and employed DL algorithms. The works in [21], [23], [22], [24] provide malware detection methods based on system calls and RNN. Others [8], [20], [19] have also used Recurrent Neural Networks (RNN) and Convolutional Neural Network (CNN) but, instead focused on API calls.…”
Section: A Dynamic Malware Detectionmentioning
confidence: 99%
“…e former describes the exponential decrease in the gradient for long-term cells to zero, and the latter describes the opposite event. To address these issues, an LSTM architecture was proposed [19,31], which has become popular for many applications [32,33]. During the drive deterioration process, certain health status changes and workloads influence HDD health over a long period;…”
Section: Lstm-rnn-based Prediction Modelmentioning
confidence: 99%
“…Due to the increased demand for computational resources, recurrent and convolutional neural network algorithms are gaining increased attention and are recently applied in a supervised or unsupervised learning model for detecting anomalous events [97]- [99]. This is mainly attributed to their ability to find patterns from sequence data of cloud networks [100]. It is anticipated that deep learning-based approaches can help improve the overall performance and efficiency of cloud-based IDSs [101]- [103].…”
Section: Collaborative Idss In Cloud Systemsmentioning
confidence: 99%