Abstract
Now a day’s most of the organizations depend on cloud infrastructure for application, storage and real time access perspective. Cloud based application save as a backbone to organization in terms of maintainability, scalability and management underlying infrastructure. To meet the demand of such organization cloud service providers provide Infra-Structure as a Service (IaaS) through Amazon EC2, Microsoft and Azure Virtual Machine. Because of higher utilization of cloud platform, it becomes more targeted to attackers. In security view of IaaS, malware become the most dangerous threat to IaaS Infrastructure. In proposed method, two RNN architectures of deep learning are considered for detecting malware in cloud virtual machine such as LSTMRNNs (Long Short Term RNN) and GRU (Gated Recurrent Unit RNN). Behavioral features of CPU, disk utilization and memory are learnt. Running applications in real time environment in online cloud platform with no restriction and capture all behaviors of normal and benign applications. This model achieves higher detection rate of 99% over 42,480 datasets. Based on the ordering of input data, the performance varied.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
S. Namasudra, P. Roy, B. Balusamy, Cloud computing: fundamentals and research issues, in 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM) (2017), pp. 7–12. https://doi.org/10.1109/ICRTCCM.2017.49
X. Liu, C. Xia, T. Wang, L. Zhong, CloudSec: A novel approach to verifying security conformance at the bottom of the cloud, in 2017 IEEE International Congress on Big Data (BigData Congress) (2017), pp. 569–576
M. Ijaz, M.H. Durad, M. Ismail, Static and dynamic malware analysis using machine learning, in 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (2019), pp. 687–691. https://doi.org/10.1109/IBCAST.2019.8667136
M. Egele, T. Scholte, E. Kirda, C. Kruegel, A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2), 1–42 (2012)
Z. Bazrafshan, H. Hashemi, S.M.H. Fard, A. Hamzeh, A survey on heuristic malware detection techniques, in 2013 5th Conference on Information and Knowledge Technology (IKT) (IEEE, 2013), pp. 113–120
I. Firdausi, C. Lim, A. Erwin, A.S. Nugroho, Analysis of machine learning techniques used in behavior-based malware detection, in Proceeding of 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (Dec 2010), pp. 201–203
Y. Fan, Y. Ye, L. Chen, Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52, 16–25 (2016)
S. Joshi, H. Upadhyay, L. Lagos, N.S. Akkipeddi, V. Guerra, Machine learning approach for malware detection using random forest classifier on process list data structure, in Proceedings of the 2nd International Conference on Information System and Data Mining (ICISDM) (2018), pp. 98–102
J. Zhang et al., Malware detection based on dynamic multi-feature using ensemble learning at hypervisor. IEEE Glob. Commun. Conf. (GLOBECOM) 2018, 1–6 (2018). https://doi.org/10.1109/GLOCOM.2018.8648070
Z.S. Malek, B. Trivedi, A. Shah, User behavior pattern-signature based intrusion detection, in 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (2020), pp. 549–552. https://doi.org/10.1109/WorldS450073.2020.9210368
Q. Guan, Z. Zhang, S. Fu, Ensemble of Bayesian predictors for autonomic failure management in cloud computing, in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) (2011), pp. 1–6. https://doi.org/10.1109/ICCCN.2011.6006036
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Prabhavathy, M., Uma Maheswari, S., Saveeth, R., Saranya Rubini, S., Surendiran, B. (2022). A Novel Approach for Detecting Online Malware Detection LSTMRNN and GRU Based Recurrent Neural Network in Cloud Environment. In: Rathore, V.S., Sharma, S.C., Tavares, J.M.R., Moreira, C., Surendiran, B. (eds) Rising Threats in Expert Applications and Solutions. Lecture Notes in Networks and Systems, vol 434. Springer, Singapore. https://doi.org/10.1007/978-981-19-1122-4_1
Download citation
DOI: https://doi.org/10.1007/978-981-19-1122-4_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-1121-7
Online ISBN: 978-981-19-1122-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)