Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 1/2022

05-01-2022

Developing a novel methodology for virtual machine introspection to classify unknown malware functions

Authors: Rahul N. Vaza, Ramesh Prajapati, Dushyantsinh Rathod, Dineshkumar Vaghela

Published in: Peer-to-Peer Networking and Applications | Issue 1/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent years, cloud service security is a crucial task because of several vulnerabilities in Virtual Machine such as malicious activities, viruses, and errors. Therefore detecting malicious activity is essential to improve the security of the cloud and VM. There are many existing techniques are developed to identify malicious attacks but still having the issues of less accuracy of detecting attacks, high false prediction rate and error also the main problem is the complexity to detect malware attacks because of large files. So, this current research proposed a new Adversarial-based Generative Model with African Buffalo (AGM-AB) technique to classify unknown malware functions presented in the VM. Also, AB fitness is initializing in AGM for enhancing the performance of feature extraction and classification. In addition, the developed AGM-AB technique categorizes executable files of benign and malware also improve the accuracy of malware detection. Furthermore, launch the unknown malware in developed technique for validating the efficiency of classification in AGM-AB technique. Thus the developed AGM-AB technique is implemented in python, and the performance metrics are calculated such as accuracy, AUC, False Positive Rate (FPR), recall value, precision, and F-measure.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
8.
go back to reference Spensky C (2020) Analyzing and Securing Embedded Systems. Diss. UC Santa Barbara Spensky C (2020) Analyzing and Securing Embedded Systems. Diss. UC Santa Barbara
11.
go back to reference Alverti C, Psomadakis S, Karakostas V, Gandhi J, Nikas K, Goumas G, Koziris N (2020) Enhancing and exploiting contiguity for fast memory virtualization. In 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), pp. 515–528. IEEE. https://doi.org/10.1109/ISCA45697.2020.00050 Alverti C, Psomadakis S, Karakostas V, Gandhi J, Nikas K, Goumas G, Koziris N (2020) Enhancing and exploiting contiguity for fast memory virtualization. In 2020 ACM/IEEE 47th Annual International Symposium on Computer Architecture (ISCA), pp. 515–528. IEEE. https://​doi.​org/​10.​1109/​ISCA45697.​2020.​00050
14.
go back to reference Gajrani J, Laxmi V, Tripathi M, Gaur MS, Zemmari A, Mosbah M, Conti M (2020) Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Advances in Computers, 119:73–120. Academic Press Inc.: Cambridge, MA, USA Gajrani J, Laxmi V, Tripathi M, Gaur MS, Zemmari A, Mosbah M, Conti M (2020) Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Advances in Computers, 119:73–120. Academic Press Inc.: Cambridge, MA, USA
17.
27.
go back to reference Abou-Assaleh T, Cercone N, Keselj V, Sweidan R(2004) Detection of new malicious code using n-grams signatures. In: PST, pp 193–196 Abou-Assaleh T, Cercone N, Keselj V, Sweidan R(2004) Detection of new malicious code using n-grams signatures. In: PST, pp 193–196
Metadata
Title
Developing a novel methodology for virtual machine introspection to classify unknown malware functions
Authors
Rahul N. Vaza
Ramesh Prajapati
Dushyantsinh Rathod
Dineshkumar Vaghela
Publication date
05-01-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 1/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-021-01281-5

Other articles of this Issue 1/2022

Peer-to-Peer Networking and Applications 1/2022 Go to the issue

Premium Partner