Skip to main content

A Novel Approach for Detecting Online Malware Detection LSTMRNN and GRU Based Recurrent Neural Network in Cloud Environment

  • Conference paper
  • First Online:
Rising Threats in Expert Applications and Solutions

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 434))

Abstract

Now a day’s most of the organizations depend on cloud infrastructure for application, storage and real time access perspective. Cloud based application save as a backbone to organization in terms of maintainability, scalability and management underlying infrastructure. To meet the demand of such organization cloud service providers provide Infra-Structure as a Service (IaaS) through Amazon EC2, Microsoft and Azure Virtual Machine. Because of higher utilization of cloud platform, it becomes more targeted to attackers. In security view of IaaS, malware become the most dangerous threat to IaaS Infrastructure. In proposed method, two RNN architectures of deep learning are considered for detecting malware in cloud virtual machine such as LSTMRNNs (Long Short Term RNN) and GRU (Gated Recurrent Unit RNN). Behavioral features of CPU, disk utilization and memory are learnt. Running applications in real time environment in online cloud platform with no restriction and capture all behaviors of normal and benign applications. This model achieves higher detection rate of 99% over 42,480 datasets. Based on the ordering of input data, the performance varied.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Namasudra, P. Roy, B. Balusamy, Cloud computing: fundamentals and research issues, in 2017 Second International Conference on Recent Trends and Challenges in Computational Models (ICRTCCM) (2017), pp. 7–12. https://doi.org/10.1109/ICRTCCM.2017.49

  2. X. Liu, C. Xia, T. Wang, L. Zhong, CloudSec: A novel approach to verifying security conformance at the bottom of the cloud, in 2017 IEEE International Congress on Big Data (BigData Congress) (2017), pp. 569–576

    Google Scholar 

  3. M. Ijaz, M.H. Durad, M. Ismail, Static and dynamic malware analysis using machine learning, in 2019 16th International Bhurban Conference on Applied Sciences and Technology (IBCAST) (2019), pp. 687–691. https://doi.org/10.1109/IBCAST.2019.8667136

  4. M. Egele, T. Scholte, E. Kirda, C. Kruegel, A survey on automated dynamic malware-analysis techniques and tools. ACM Comput. Surv. 44(2), 1–42 (2012)

    Google Scholar 

  5. Z. Bazrafshan, H. Hashemi, S.M.H. Fard, A. Hamzeh, A survey on heuristic malware detection techniques, in 2013 5th Conference on Information and Knowledge Technology (IKT) (IEEE, 2013), pp. 113–120

    Google Scholar 

  6. I. Firdausi, C. Lim, A. Erwin, A.S. Nugroho, Analysis of machine learning techniques used in behavior-based malware detection, in Proceeding of 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies (Dec 2010), pp. 201–203

    Google Scholar 

  7. Y. Fan, Y. Ye, L. Chen, Malicious sequential pattern mining for automatic malware detection. Expert Syst. Appl. 52, 16–25 (2016)

    Article  Google Scholar 

  8. S. Joshi, H. Upadhyay, L. Lagos, N.S. Akkipeddi, V. Guerra, Machine learning approach for malware detection using random forest classifier on process list data structure, in Proceedings of the 2nd International Conference on Information System and Data Mining (ICISDM) (2018), pp. 98–102

    Google Scholar 

  9. J. Zhang et al., Malware detection based on dynamic multi-feature using ensemble learning at hypervisor. IEEE Glob. Commun. Conf. (GLOBECOM) 2018, 1–6 (2018). https://doi.org/10.1109/GLOCOM.2018.8648070

    Article  Google Scholar 

  10. Z.S. Malek, B. Trivedi, A. Shah, User behavior pattern-signature based intrusion detection, in 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) (2020), pp. 549–552. https://doi.org/10.1109/WorldS450073.2020.9210368

  11. Q. Guan, Z. Zhang, S. Fu, Ensemble of Bayesian predictors for autonomic failure management in cloud computing, in 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN) (2011), pp. 1–6. https://doi.org/10.1109/ICCCN.2011.6006036

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Prabhavathy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Prabhavathy, M., Uma Maheswari, S., Saveeth, R., Saranya Rubini, S., Surendiran, B. (2022). A Novel Approach for Detecting Online Malware Detection LSTMRNN and GRU Based Recurrent Neural Network in Cloud Environment. In: Rathore, V.S., Sharma, S.C., Tavares, J.M.R., Moreira, C., Surendiran, B. (eds) Rising Threats in Expert Applications and Solutions. Lecture Notes in Networks and Systems, vol 434. Springer, Singapore. https://doi.org/10.1007/978-981-19-1122-4_1

Download citation

Publish with us

Policies and ethics