{"id":"https://openalex.org/W2799664252","doi":"https://doi.org/10.1109/tcc.2018.2829202","title":"VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment","display_name":"VMGuard: A VMI-based Security Architecture for Intrusion Detection in Cloud Environment","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2799664252","doi":"https://doi.org/10.1109/tcc.2018.2829202","mag":"2799664252"},"language":"en","primary_location":{"id":"doi:10.1109/tcc.2018.2829202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2018.2829202","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071738342","display_name":"Preeti Mishra","orcid":"https://orcid.org/0000-0002-3809-0887"},"institutions":[{"id":"https://openalex.org/I60054993","display_name":"Graphic Era University","ror":"https://ror.org/03wqgqd89","country_code":"IN","type":"education","lineage":["https://openalex.org/I60054993"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Preeti Mishra","raw_affiliation_strings":["Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun, India","institution_ids":["https://openalex.org/I60054993"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5029458848","display_name":"Vijay Varadharajan","orcid":"https://orcid.org/0000-0002-3621-9114"},"institutions":[{"id":"https://openalex.org/I78757542","display_name":"University of Newcastle Australia","ror":"https://ror.org/00eae9z71","country_code":"AU","type":"education","lineage":["https://openalex.org/I78757542"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Vijay Varadharajan","raw_affiliation_strings":["Faculty of Engineering and Built Environment & Advanced Cyber Security Engineering Research Centre (ACSRC), University of Newcastle, Callaghan, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Built Environment & Advanced Cyber Security Engineering Research Centre (ACSRC), University of Newcastle, Callaghan, Australia","institution_ids":["https://openalex.org/I78757542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040360984","display_name":"Emmanuel S. Pilli","orcid":"https://orcid.org/0000-0002-6056-1147"},"institutions":[{"id":"https://openalex.org/I83205935","display_name":"Malaviya National Institute of Technology Jaipur","ror":"https://ror.org/0077k1j32","country_code":"IN","type":"education","lineage":["https://openalex.org/I83205935"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Emmanuel Pilli","raw_affiliation_strings":["Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Malaviya National Institute of Technology, Jaipur, India","institution_ids":["https://openalex.org/I83205935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010613188","display_name":"Udaya Tupakula","orcid":"https://orcid.org/0000-0001-5048-9797"},"institutions":[{"id":"https://openalex.org/I78757542","display_name":"University of Newcastle Australia","ror":"https://ror.org/00eae9z71","country_code":"AU","type":"education","lineage":["https://openalex.org/I78757542"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Udaya Tupakula","raw_affiliation_strings":["Faculty of Engineering and Built Environment & Advanced Cyber Security Engineering Research Centre (ACSRC), University of Newcastle, Callaghan, Australia"],"affiliations":[{"raw_affiliation_string":"Faculty of Engineering and Built Environment & Advanced Cyber Security Engineering Research Centre (ACSRC), University of Newcastle, Callaghan, Australia","institution_ids":["https://openalex.org/I78757542"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071738342"],"corresponding_institution_ids":["https://openalex.org/I60054993"],"apc_list":null,"apc_paid":null,"fwci":4.1037,"has_fulltext":false,"cited_by_count":79,"citation_normalized_percentile":{"value":0.94305674,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8419970273971558},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.7713061571121216},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.6927834749221802},{"id":"https://openalex.org/keywords/hypervisor","display_name":"Hypervisor","score":0.6686651706695557},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.6401087045669556},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6069751977920532},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.46637728810310364},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4205198884010315},{"id":"https://openalex.org/keywords/random-forest","display_name":"Random forest","score":0.4200509786605835},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.41307663917541504},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.3318655490875244},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.29438233375549316}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8419970273971558},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.7713061571121216},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6927834749221802},{"id":"https://openalex.org/C112904061","wikidata":"https://www.wikidata.org/wiki/Q1077480","display_name":"Hypervisor","level":4,"score":0.6686651706695557},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.6401087045669556},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6069751977920532},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.46637728810310364},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4205198884010315},{"id":"https://openalex.org/C169258074","wikidata":"https://www.wikidata.org/wiki/Q245748","display_name":"Random forest","level":2,"score":0.4200509786605835},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.41307663917541504},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.3318655490875244},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.29438233375549316},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tcc.2018.2829202","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tcc.2018.2829202","pdf_url":null,"source":{"id":"https://openalex.org/S2492498579","display_name":"IEEE Transactions on Cloud Computing","issn_l":"2168-7161","issn":["2168-7161","2372-0018"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:rune.une.edu.au:1959.11/57098","is_oa":false,"landing_page_url":"https://hdl.handle.net/1959.11/57098","pdf_url":null,"source":{"id":"https://openalex.org/S7407055448","display_name":"RUNE (Research UNE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal Article"},{"id":"pmh:uon:41567","is_oa":false,"landing_page_url":"http://hdl.handle.net/1959.13/1441898","pdf_url":null,"source":{"id":"https://openalex.org/S4377196471","display_name":"NOVA (University of Newcastle Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I78757542","host_organization_name":"University of Newcastle Australia","host_organization_lineage":["https://openalex.org/I78757542"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Life in Land","id":"https://metadata.un.org/sdg/15","score":0.46000000834465027}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W17417926","https://openalex.org/W73598622","https://openalex.org/W143519483","https://openalex.org/W1501672631","https://openalex.org/W1539745582","https://openalex.org/W1546317334","https://openalex.org/W1641762327","https://openalex.org/W1941427975","https://openalex.org/W1965667542","https://openalex.org/W1975177131","https://openalex.org/W1982713405","https://openalex.org/W1987859285","https://openalex.org/W2002627919","https://openalex.org/W2003352679","https://openalex.org/W2043491664","https://openalex.org/W2055130908","https://openalex.org/W2087740020","https://openalex.org/W2100533862","https://openalex.org/W2108217512","https://openalex.org/W2112731379","https://openalex.org/W2119982986","https://openalex.org/W2128217000","https://openalex.org/W2129860818","https://openalex.org/W2144006591","https://openalex.org/W2159265516","https://openalex.org/W2163030488","https://openalex.org/W2176830056","https://openalex.org/W2194764139","https://openalex.org/W2293923001","https://openalex.org/W2317750305","https://openalex.org/W2481266035","https://openalex.org/W2531967557","https://openalex.org/W2540282505","https://openalex.org/W2574215789","https://openalex.org/W2620612601","https://openalex.org/W2911964244","https://openalex.org/W3136767761","https://openalex.org/W6603043977","https://openalex.org/W6605901207","https://openalex.org/W6630171654","https://openalex.org/W6632363105","https://openalex.org/W6632599652","https://openalex.org/W6637110787","https://openalex.org/W6684045068","https://openalex.org/W6685576885","https://openalex.org/W6729130510"],"related_works":["https://openalex.org/W2148749405","https://openalex.org/W2104105430","https://openalex.org/W1515917392","https://openalex.org/W1973516247","https://openalex.org/W1991063492","https://openalex.org/W2613320081","https://openalex.org/W2179519055","https://openalex.org/W2743348030","https://openalex.org/W2747005099","https://openalex.org/W2145292010"],"abstract_inverted_index":{"Cloud":[0],"security":[1,25,35,51,99],"is":[2,146],"of":[3,10,20,23,58,111,133,157,167,184,204,206,222,236,247],"paramount":[4],"importance":[5],"in":[6,101],"the":[7,21,59,75,78,102,109,122,126,140,155,192,207,234,245,248],"new":[8],"era":[9],"computing.":[11],"Advanced":[12],"malware":[13,230],"can":[14,150],"hide":[15],"their":[16,67],"behavior":[17,110,200],"on":[18,92,136],"detection":[19],"presence":[22],"a":[24,28,45,198,213,217,228],"tool":[26],"at":[27,77,125],"tenant":[29],"virtual":[30,60,103],"machine":[31],"(TVM).":[32],"Hence,":[33],"TVM-layer":[34],"solutions":[36],"are":[37,241],"not":[38],"reliable.":[39],"In":[40],"this":[41],"paper,":[42],"we":[43],"propose":[44],"Virtual":[46],"Machine":[47],"Introspection":[48],"(VMI)":[49],"based":[50,91],"architecture":[52],"design":[53],"for":[54,73,201],"fine":[55],"granular":[56],"monitoring":[57,74],"machines":[61,104],"to":[62,85,114,128,153,179,196],"detect":[63,86],"known":[64],"attacks":[65,87,96,106],"and":[66,81,105,149,181,186,215,227,243,256],"variants.":[68],"We":[69,210,250],"have":[70,211],"developed":[71],"techniques":[72,255],"TVMs":[76],"process":[79],"level":[80,84],"system":[82,130],"call":[83,131],"such":[88],"as":[89],"those":[90],"malicious":[93],"hidden":[94],"processes,":[95],"that":[97,107],"disable":[98],"tools":[100],"alter":[108],"legitimate":[112],"applications":[113],"access":[115],"sensitive":[116],"data.":[117],"Our":[118],"architecture,":[119],"VMGuard,":[120],"utilizes":[121],"introspection":[123],"feature":[124],"VMM-layer":[127],"analyze":[129],"traces":[132],"programs":[134],"running":[135],"TVM.":[137,209],"VMGuard":[138,164,252],"applies":[139,191],"software":[141],"breakpoint":[142],"injection":[143],"technique":[144],"which":[145],"OS":[147],"agnostic":[148],"be":[151],"used":[152],"trap":[154],"execution":[156],"programs.":[158],"Motivated":[159],"by":[160],"text":[161],"mining":[162],"approaches,":[163],"provides":[165],"`Bag":[166],"n-grams":[168],"(BonG)'":[169],"approach":[170],"integrated":[171],"with":[172,253],"Term":[173],"Frequency-Inverse":[174],"Document":[175],"Frequency":[176],"(TF-IDF)":[177],"method,":[178],"extract":[180],"select":[182],"features":[183],"normal":[185],"attack":[187],"traces.":[188],"It":[189],"then":[190],"Random":[193],"Forest":[194],"classifier":[195],"produce":[197],"generic":[199],"different":[202],"categories":[203],"intrusions":[205],"monitored":[208],"implemented":[212],"prototype":[214],"conducted":[216],"detailed":[218],"analysis":[219],"using":[220],"University":[221,235],"New":[223],"Mexico":[224],"(UNM)":[225],"datasets":[226],"Windows":[229],"dataset":[231],"obtained":[232,240],"from":[233],"California.":[237],"The":[238],"results":[239],"promising":[242],"demonstrate":[244],"applicability":[246],"VMGuard.":[249],"compare":[251],"existing":[254],"discuss":[257],"its":[258],"advantages.":[259]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":17},{"year":2022,"cited_by_count":23},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
