Detailed Information

Cited 0 time in webofscience Cited 12 time in scopus
Metadata Downloads

Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud

Full metadata record
DC Field Value Language
dc.contributor.authorMelvin, A. Alfred Raja-
dc.contributor.authorKathrine, G. Jaspher W.-
dc.contributor.authorIlango, S. Sudhakar-
dc.contributor.authorVimal, S.-
dc.contributor.authorRho, Seungmin-
dc.contributor.authorXiong, Neal N.-
dc.contributor.authorNam, Yunyoung-
dc.date.accessioned2021-09-10T06:44:52Z-
dc.date.available2021-09-10T06:44:52Z-
dc.date.issued2022-04-
dc.identifier.issn2161-3915-
dc.identifier.urihttps://scholarworks.bwise.kr/sch/handle/2021.sw.sch/19307-
dc.description.abstractIn this new era of cloud computing, Intrusion Detection System (IDS) is very essential for the continual monitoring of computing resources for signs of compromise since the number of attack vectors and malware are in increase. Only few IDS datasets are publicly available and those available are outdated, lack cloud-specific attacks. This article presents a novel dataset based on Virtual Machine Introspected data for the implementation of IDS in cloud. The dataset was generated from the behavioral characteristics of malware and benign sample execution traces on virtual machines using Virtual Machine Introspection (VMI) technique. A vector space model based on system call approach is applied to analyze the behavioral characteristics for the generation of proposed dataset. The purpose of this study is to compare the proposed dataset with existing datasets and evaluate the effectiveness of these datasets by applying Machine Learning (ML) algorithms with 10-fold cross-validation. The ML algorithms used in the experiments are C4.5, Random Forest, JRip, NaiveBayes, K-Nearest Neighbors (KNN), and Support Vector Machine (SVM). The effectiveness of detecting intrusions using proposed dataset is promising compared with other datasets in-terms of intrusion detection accuracy, recall value, precision, and F1-score metrics. For example, the intrusion detection accuracy in proposed dataset is 0.11% improved than UNM dataset, 6.28% higher than ADFA dataset, and 1.88% higher than LID dataset with C4.5 algorithm. Therefore, the proposed dataset is best suitable for implementing IDS for cloud.-
dc.language영어-
dc.language.isoENG-
dc.publisherJohn Wiley and Sons Ltd-
dc.titleDynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud-
dc.typeArticle-
dc.publisher.location미국-
dc.identifier.doi10.1002/ett.4287-
dc.identifier.scopusid2-s2.0-85105404135-
dc.identifier.wosid000647974700001-
dc.identifier.bibliographicCitationTransactions on Emerging Telecommunications Technologies, v.33, no.4-
dc.citation.titleTransactions on Emerging Telecommunications Technologies-
dc.citation.volume33-
dc.citation.number4-
dc.type.docTypeArticle-
dc.description.isOpenAccessN-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryTelecommunications-
Files in This Item
There are no files associated with this item.
Appears in
Collections
College of Engineering > Department of Computer Science and Engineering > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Nam, Yun young photo

Nam, Yun young
College of Engineering (Department of Computer Science and Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE