Cloud Computing strives to be dynamic as a service oriented architecture. The services in the SoA are rendered in terms of private, public and in many other commercial domain aspects. These services should be secured and thus are very vital to the cloud infrastructure. In order, to secure and maintain resilience in the cloud, it not only has to have the ability to identify the known threats but also to new challenges that target the infrastructure of a cloud. In this paper, we introduce and discuss a detection method of malwares from the VM logs and corresponding VM snapshots are classified into attacked and non-attacked VM snapshots. As snapshots are always taken to be a backup in the backup servers, especially during the night hours, this approach could reduce the overhead of the backup server with a self-healing capability of the VMs in the local cloud infrastructure. A machine learning approach at the hypervisor level is projected, the features being gathered from the API calls of VM instances in the IaaS level of cloud service. Our proposed scheme can have a high detection accuracy of about 93% while having the capability to classify and detect different types of malwares with respect to the VM snapshots. Finally the paper exhibits an algorithm using snapshots to detect and thus to self-heal using the monitoring components of a particular VM instances applied to cloud scenarios. The self-healing approach with machine learning algorithms can determine new threats with some prior knowledge of its functionality.
[1]
Ruby B. Lee,et al.
Monitoring and Attestation of Virtual Machine Security Health in Cloud Computing
,
2016,
IEEE Micro.
[2]
Brian Hay,et al.
Forensics examination of volatile system data using virtual introspection
,
2008,
OPSR.
[3]
Haibo Chen,et al.
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring
,
2011,
2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[4]
Michael K. Reiter,et al.
Cross-VM side channels and their use to extract private keys
,
2012,
CCS.
[5]
Christopher Leckie,et al.
A Game Theoretical Approach to Defend Against Co-Resident Attacks in Cloud Computing: Preventing Co-Residence Using Semi-Supervised Learning
,
2016,
IEEE Transactions on Information Forensics and Security.
[6]
Vijay Varadharajan,et al.
Intrusion detection techniques in cloud environment: A survey
,
2017,
J. Netw. Comput. Appl..