[1] MATTETTI M,SHULMAN-PELEG A,ALLOUCHE Y,et al.Securing the infrastructure and the workloads of linux containers[A].IEEE Conference on Communications and Network Security[C].Florence,Italy:IEEE,2015.524-526.
[2] FORREST S,HOFMERYR S A,SOMAYAJI A,et al.A sense of self for unix processes[A].Proceedings of the 1996 IEEE Symposium on Security and Privacy[C].Oakland:IEEE,1996.120-128.
[3] KOSORESOW A P,HOFMEYR S A.Intrusion detection via system call traces[J].Software IEEE,1997,14(5):35-42.
[4] MISHRA P,PILLI E S,VARADHARAJAN V,et al.Intrusion detection techniques in cloud environment:a survey[J].Journal of Network and Computer Applications,2017,77(C):18-47.
[5] MASKE S A,PARVAT T J.Advanced anomaly intrusion detection technique for host based system using system call patterns[A].International Conference on Inventive Computation Technologies[C].Coimbatore,India:IEEE,2017.1-4.
[6] KHREICH W,KHOSRAVIFAR B,HAMOU-LHADJ A,et al.An anomaly detection system based on variable n-gram features and one-class SVM[J].Information and Software Technology,2017,91:186-197.
[7] XIAO X,WANG Z,LI Q,et al.Back-propagation neural network on markov chains from system call sequences:a new approach for detecting android malware with system call sequences[J].Iet Information Security,2017,11(1):8-15.
[8] 尹清波,张汝波,李雪耀,等.基于动态马尔科夫模型的入侵检测技术研究[J].电子学报,2004,32(11):1785-1788. YIN Qing-bo,ZHANG Ru-bo,LI Xue-yao,et al.Research on technology of intrusion detection based on dynamic markov model[J].Acta Electronica Sinica,2004,32(11):1785-1788.(in Chinese)
[9] Xiao X,Zhang S,MERCALDO F,et al.Android malware detection based on system call sequences and LSTM[J].Multimedia Tools and Applications,2017,2:1-21.
[10] 陈兴蜀,陈佳昕,赵丹丹,等.基于虚拟机IO序列与Markov模型的异常行为检测[J].清华大学学报(自然科学版),2018,58(4):395-401+410. CHEN Xing-shu,CHEN Jia-xin,ZHAO Dan-dan,et al.Anomaly detection based on io sequences in a virtual machine with the markov mode[J].Journal Tsinghua University (Science and Technology),2018,58(4):395-401+410.(in Chinese)
[11] ALARIFI S,WOLTHUSEN S.Anomaly detection for ephemeral cloud iaas virtual machines[A].International Conference on Network and System Security[C].Berlin Heidelberg:Springer,2014.321-335.
[12] GUPTA S,KUMAR P.An immediate system call sequence based approach for detecting malicious program executions in cloud environment[J].Wireless Personal Communications,2015,81(1):1-21.
[13] TAHIR R,RAZA A,NAQVI M,et al.An anomaly detection fabric for clouds based on collaborative vm communities[A].IEEE/ACM International Symposium on Cluster,Cloud and Grid Computing[C].Madrid,Spain:IEEE,2017.431-441.
[14] KASHYAP A,KUMAR G S,JANGIR S,et al.IHIDS:Introspection-based hybrid intrusion detection system in cloud environment[A].International Conference on Advances in Computing,Communications and Informatics[C].Udupi,India:IEEE,2017.687-693.
[15] ELGRAINI M T,ASSEM N,RACHIDI T.Host intrusion detection for long stealthy system call sequences[A].Information Science and Technology[C].Fez,Morocco:IEEE,2012.96-100.
[16] KOUCHAM O,RACHIDI T,ASSEM N.Host intrusion detection using system call argument-based clustering combined with bayesian classication[A].Sai Intelligent Systems Conference[C].London,UK:IEEE,2015.1010-1016.
[17] MURTAZA S S,KHREICH W,HAMOULHADJ A,et al.A host-based anomaly detection approach by representing system calls as states of kernel modules[A].IEEE International Symposium on Software Reliability Engineering[C].Pasadena,CA,USA:IEEE,2014.431-440.
[18] 黄杰.云环境虚拟机安全关键技术研究与实现[D].四川成都:电子科技大学,2017. HUANG Jie.Research and implementation of virtual machine security key technology on cloud environment[D].Chengdu,Sichuan:University of Electronic Science and Technology of China,2017.(in Chinese) |