
Cyberattacks targeted at virtualization infrastructure\ud underlying cloud computing services has become increasingly\ud sophisticated. This paper presents a novel malware and rookit detection\ud system which protects the guests against different attacks.\ud It combines system call monitoring and system call hashing on the\ud guest kernel together with Support Vector Machines (SVM)-based\ud external monitoring on the host. We demonstrate the effectiveness\ud of our solution by evaluating it against well-known user-level\ud malware as well as kernel-level rootkit attacks.\ud Keywords—virtualization security, cloud security,
QA75, virtualization security, cloud computing, virtualization, virtual machine introspection, QA76
QA75, virtualization security, cloud computing, virtualization, virtual machine introspection, QA76
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 4 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
