{"id":"https://openalex.org/W4378976847","doi":"https://doi.org/10.1109/icai58407.2023.10136655","title":"The next generation of cloud security through hypervisor-based virtual machine introspection","display_name":"The next generation of cloud security through hypervisor-based virtual machine introspection","publication_year":2023,"publication_date":"2023-02-22","ids":{"openalex":"https://openalex.org/W4378976847","doi":"https://doi.org/10.1109/icai58407.2023.10136655"},"language":"en","primary_location":{"id":"doi:10.1109/icai58407.2023.10136655","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icai58407.2023.10136655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 3rd International Conference on Artificial Intelligence (ICAI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102001343","display_name":"Fazal\u2010ur\u2010 Rehman","orcid":"https://orcid.org/0000-0002-2286-5393"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Fazalur Rehman","raw_affiliation_strings":["Air University,Department of Cybersecuritv,Islamabad,Pakistan","Department of Cybersecuritv, Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Air University,Department of Cybersecuritv,Islamabad,Pakistan","institution_ids":["https://openalex.org/I899713450"]},{"raw_affiliation_string":"Department of Cybersecuritv, Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101510048","display_name":"Zia Muhammad","orcid":"https://orcid.org/0000-0002-9172-5212"},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Zia Muhammad","raw_affiliation_strings":["Air University,Department of Game Development,Islamabad,Pakistan","Department of Game Development, Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Air University,Department of Game Development,Islamabad,Pakistan","institution_ids":["https://openalex.org/I899713450"]},{"raw_affiliation_string":"Department of Game Development, Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024772608","display_name":"Sara Asif","orcid":null},"institutions":[{"id":"https://openalex.org/I899713450","display_name":"Air University","ror":"https://ror.org/03yfe9v83","country_code":"PK","type":"education","lineage":["https://openalex.org/I899713450"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Sara Asif","raw_affiliation_strings":["Air University,Department of Cybersecuritv,Islamabad,Pakistan","Department of Cybersecuritv, Air University, Islamabad, Pakistan"],"affiliations":[{"raw_affiliation_string":"Air University,Department of Cybersecuritv,Islamabad,Pakistan","institution_ids":["https://openalex.org/I899713450"]},{"raw_affiliation_string":"Department of Cybersecuritv, Air University, Islamabad, Pakistan","institution_ids":["https://openalex.org/I899713450"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101787006","display_name":"Hameedur Rahman","orcid":"https://orcid.org/0000-0001-8892-9911"},"institutions":[{"id":"https://openalex.org/I57328836","display_name":"North Dakota State University","ror":"https://ror.org/05h1bnb22","country_code":"US","type":"education","lineage":["https://openalex.org/I57328836"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hameedur Rahman","raw_affiliation_strings":["North Dakota State University (NDSU),Department of Computer Science,Fargo,ND,USA,58108"],"affiliations":[{"raw_affiliation_string":"North Dakota State University (NDSU),Department of Computer Science,Fargo,ND,USA,58108","institution_ids":["https://openalex.org/I57328836"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5102001343"],"corresponding_institution_ids":["https://openalex.org/I899713450"],"apc_list":null,"apc_paid":null,"fwci":1.834,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.8599687,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"116","last_page":"121"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.9151391386985779},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8790361881256104},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7932289242744446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7604665756225586},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.7074840068817139},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.6527759432792664},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6222582459449768},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5801167488098145},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5524600148200989},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.5200988054275513},{"id":"https://openalex.org/keywords/confidentiality","display_name":"Confidentiality","score":0.41978687047958374},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.4129476249217987},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20921793580055237},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.1924741268157959}],"concepts":[{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.9151391386985779},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8790361881256104},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7932289242744446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7604665756225586},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.7074840068817139},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.6527759432792664},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6222582459449768},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5801167488098145},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5524600148200989},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.5200988054275513},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.41978687047958374},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.4129476249217987},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20921793580055237},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.1924741268157959}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icai58407.2023.10136655","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icai58407.2023.10136655","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 3rd International Conference on Artificial Intelligence (ICAI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1521523431","https://openalex.org/W2293923001","https://openalex.org/W2531967557","https://openalex.org/W2766465617","https://openalex.org/W2912528408","https://openalex.org/W2998318224","https://openalex.org/W3026882057","https://openalex.org/W3053471225","https://openalex.org/W3146114005","https://openalex.org/W3188312523","https://openalex.org/W3208244203","https://openalex.org/W4280523245","https://openalex.org/W4280563089","https://openalex.org/W4283314473","https://openalex.org/W4287239844","https://openalex.org/W4317506512","https://openalex.org/W4318336623"],"related_works":["https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1515917392","https://openalex.org/W2743348030","https://openalex.org/W1973516247","https://openalex.org/W1991063492","https://openalex.org/W2613320081","https://openalex.org/W2179519055","https://openalex.org/W2967546679","https://openalex.org/W4387237709"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,62],"has":[2,17,120],"become":[3],"increasingly":[4],"prevalent":[5],"in":[6,248],"recent":[7],"years,":[8],"providing":[9],"organizations":[10,236],"with":[11,19,128,131],"on-demand":[12],"re-sources.":[13],"While":[14],"cloud":[15,28,51,66,83,158,175,187],"infrastructure":[16],"matured":[18],"security":[20,86,181,235],"en-hancements,":[21],"attackers'":[22],"strategies":[23,240],"for":[24],"launching":[25],"attacks":[26,155],"on":[27,99,123,156,170],"networks":[29],"are":[30,71,96,216],"also":[31,229],"becoming":[32],"more":[33],"sophisticated,":[34],"posing":[35],"a":[36,47,105,139,165,171],"risk":[37],"to":[38,57,111,147,193,210,218,237],"the":[39,100,124,157,174,183,186,197,200,249],"system's":[40],"confidentiality,":[41],"integrity,":[42],"and":[43,61,85,89,115,149,189,195,220],"availability.":[44],"Virtualization":[45],"is":[46],"key":[48],"aspect":[49],"of":[50,154,164,173,179,199,244],"computing,":[52],"which":[53],"allows":[54],"physical":[55],"computers":[56],"share":[58],"their":[59],"resources":[60],"power.":[63],"To":[64],"secure":[65],"infrastructure,":[67],"multiple":[68],"defensive":[69,239],"measures":[70],"used":[72],"such":[73],"as":[74],"virtual":[75,101,142],"level":[76],"segregation,":[77],"intrusion":[78],"detection":[79,91],"prevention":[80],"systems":[81],"(IDS/IPS),":[82],"access":[84],"brokers":[87],"(CASB),":[88],"endpoint":[90],"&":[92],"response.":[93],"These":[94],"safeguards":[95],"often":[97],"run":[98],"machine":[102,143],"shared":[103],"across":[104],"common":[106],"network,":[107],"making":[108],"them":[109],"vulnerable":[110],"deceivability,":[112],"insider":[113],"threat,":[114],"network-level":[116],"attacks.":[117],"Previous":[118],"research":[119],"primarily":[121],"relied":[122],"traditional":[125],"approaches":[126],"discussed,":[127],"limited":[129],"compliance":[130],"hypervisor-based":[132,141],"introspection.":[133],"In":[134,177],"this":[135],"paper,":[136],"we":[137],"propose":[138],"novel":[140],"introspection":[144],"(HVMI)":[145],"tool":[146],"detect":[148,194],"perform":[150],"runtime":[151],"forensic":[152,191],"analysis":[153,192],"platform.":[159],"The":[160],"proposed":[161],"solution":[162],"consists":[163],"client":[166],"application":[167],"that":[168,215,246],"runs":[169],"host":[172],"provider.":[176],"case":[178],"any":[180],"breach,":[182],"HVMI":[184,203],"notifies":[185],"provider":[188],"starts":[190],"minimize":[196],"impact":[198],"breach.":[201],"Additionally,":[202],"uses":[204],"structured":[205],"threat":[206,213],"information":[207],"expression":[208],"(STIX)":[209],"generate":[211],"standard":[212],"details":[214],"easy":[217],"understand":[219],"widely":[221],"adopted":[222],"by":[223],"cyber":[224],"professionals.":[225],"STIX":[226],"patterns":[227],"may":[228],"be":[230],"made":[231],"publicly":[232],"available,":[233],"allowing":[234],"deduce":[238],"against":[241],"certain":[242],"types":[243],"cyberattacks":[245],"occur":[247],"cloud.":[250]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
