Facebook Instagram Twitter RSS Feed PodBean Back to top on side

Automated Approach to Intrusion Detection in VM-based Dynamic Execution Environment

In: Computing and Informatics, vol. 31, no. 2
F. Zhao - H. Jin

Details:

Year, pages: 2012, 271 - 297
Keywords:
Intrusion detection, virtual machine, hidden Markov model (HMM), sequential data mining, dynamic graph
About article:
Because virtual computing platforms are dynamically changing, it is difficult to build high-quality intrusion detection system. In this paper, we present an automated approach to intrusions detection in order to maintain sufficient performance and reduce dependence on execution environment. We discuss a hidden Markov model strategy for abnormality detection using frequent system call sequences, letting us identify attacks and intrusions automatically and efficiently. We also propose an automated mining algorithm, named AGAS, to generate frequent system call sequences. In our approach, the detection performance is adaptively tuned according to the execution state every period. To improve performance, the period value is also under self-adjustment.
How to cite:
ISO 690:
Zhao, F., Jin, H. 2012. Automated Approach to Intrusion Detection in VM-based Dynamic Execution Environment. In Computing and Informatics, vol. 31, no.2, pp. 271-297. 1335-9150.

APA:
Zhao, F., Jin, H. (2012). Automated Approach to Intrusion Detection in VM-based Dynamic Execution Environment. Computing and Informatics, 31(2), 271-297. 1335-9150.