Malicious virtual machines detection through a clustering approach

@article{Bazm2015MaliciousVM,
  title={Malicious virtual machines detection through a clustering approach},
  author={Mohammad Bazm and Rida Khatoun and Youcef Begriche and Lyes Khoukhi and Xiuzhen Chen and Ahmed Serhrouchni},
  journal={2015 International Conference on Cloud Technologies and Applications (CloudTech)},
  year={2015},
  pages={1-8}
}
Cloud computing aims to provide enormous resources and services, parallel processing and reliable access for users on the networks. The flexible resources of clouds could be used by malicious actors to attack other infrastructures. Cloud can be used as a platform to perform these attacks, a virtual machine(VM) in the Cloud can play the role of a malicious VM belonging to a Botnet and sends a heavy traffic to the victim. For cloud service providers, preventing their infrastructure from being… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-2 OF 2 CITATIONS

Clustering methods comparison: Application to source based detection of botclouds

  • 2016 International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 31 REFERENCES

Botclouds: a cyberattacker's dream

VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

A cognitive approach for botnet detection using Artificial Immune System in the cloud

  • 2014 Third International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
  • 2014

Ninja: Catch me if you can

Oscar Salazar, Rob Ragan
  • In RSA conference,
  • 2014
VIEW 1 EXCERPT

Understanding botclouds from a system perspective: A principal component analysis

  • 2014 IEEE Network Operations and Management Symposium (NOMS)
  • 2014
VIEW 1 EXCERPT

Similar Papers

Loading similar papers…