{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:40:03Z","timestamp":1747183203877,"version":"3.40.5"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319143248"},{"type":"electronic","value":"9783319143255"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-14325-5_29","type":"book-chapter","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T08:55:04Z","timestamp":1418201704000},"page":"335-346","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Network Based Malware Detection within Virtualised Environments"],"prefix":"10.1007","author":[{"given":"Pushpinder Kaur","family":"Chouhan","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Hagan","sequence":"additional","affiliation":[]},{"given":"Gavin","family":"McWilliams","sequence":"additional","affiliation":[]},{"given":"Sakir","family":"Sezer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"29_CR1","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2007183.2007189","volume":"45","author":"F. Azmandian","year":"2011","unstructured":"Azmandian, F., Moffie, M., Alshawabkeh, M., Dy, J., Aslam, J., Kaeli, D.: Virtual machine monitor-based lightweight intrusion detection. SIGOPS Oper. Syst. Rev.\u00a045(2), 38\u201353 (2011)","journal-title":"SIGOPS Oper. Syst. Rev."},{"issue":"5","key":"29_CR2","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1145\/1165389.945462","volume":"37","author":"P. Barham","year":"2003","unstructured":"Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. SIGOPS Oper. Syst. Rev.\u00a037(5), 164\u2013177 (2003)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"29_CR3","first-page":"78","volume-title":"Proceedings of the 2006 IEEE Symposium on Security and Privacy, SP 2006","author":"K. Borders","year":"2006","unstructured":"Borders, K., Zhao, X., Prakash, A.: Siren: Catching evasive malware (short paper). In: Proceedings of the 2006 IEEE Symposium on Security and Privacy, SP 2006, pp. 78\u201385. IEEE Computer Society, Washington, DC (2006)"},{"key":"29_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/978-3-642-24712-5_3","volume-title":"Communications and Multimedia Security","author":"S. Bugiel","year":"2011","unstructured":"Bugiel, S., N\u00fcrnberger, S., Sadeghi, A.-R., Schneider, T.: Twin clouds: Secure cloud computing with low latency. In: De Decker, B., Lapon, J., Naessens, V., Uhl, A. (eds.) CMS 2011. LNCS, vol.\u00a07025, pp. 32\u201344. Springer, Heidelberg (2011)"},{"issue":"SI","key":"29_CR5","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1145\/844128.844148","volume":"36","author":"G.W. Dunlap","year":"2002","unstructured":"Dunlap, G.W., King, S.T., Cinar, S., Basrai, M.A., Chen, P.M.: Revirt: Enabling intrusion analysis through virtual-machine logging and replay. SIGOPS Oper. Syst. Rev.\u00a036(SI), 211\u2013224 (2002)","journal-title":"SIGOPS Oper. Syst. Rev."},{"unstructured":"Falliere, N., Chien, E.: Zeus: King of the bots (2009)","key":"29_CR6"},{"key":"29_CR7","first-page":"193","volume-title":"9th ACM Symposium on Operating Systems Principles, SOSP 2003","author":"T. Garfinkel","year":"2003","unstructured":"Garfinkel, T., Pfaff, B., Chow, J., Rosenblum, M., Boneh, D.: Terra: A virtual machine-based platform for trusted computing. In: 9th ACM Symposium on Operating Systems Principles, SOSP 2003, pp. 193\u2013206. ACM, New York (2003)"},{"unstructured":"Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: Proc. Network and Distributed Systems Security Symposium, pp. 191\u2013206 (2003)","key":"29_CR8"},{"doi-asserted-by":"crossref","unstructured":"Han-zhang, W., Liu-sheng, H.: An improved trusted cloud computing platform model based on daa and privacy ca scheme. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), Oct 2010, vol.\u00a013 (2010)","key":"29_CR9","DOI":"10.1109\/ICCASM.2010.5622643"},{"doi-asserted-by":"crossref","unstructured":"Harrison, K., Bordbar, B., Ali, S.T.T., Dalton, C.I., Norman, A.: A Framework for Detecting Malware in Cloud by Identifying Symptoms, pp. 164\u2013172. IEEE (2012)","key":"29_CR10","DOI":"10.1109\/EDOC.2012.27"},{"doi-asserted-by":"crossref","unstructured":"Hurley, J., Munoz, A., Sezer, S.: Itaca: Flexible, scalable network analysis. In: ICC, pp. 1069\u20131073. IEEE (2012)","key":"29_CR11","DOI":"10.1109\/ICC.2012.6363995"},{"doi-asserted-by":"crossref","unstructured":"King, S.T., Chen, P.M., Wang, Y.-M., Verbowski, C., Wang, H.J., Lorch, J.R.: Subvirt: Implementing malware with virtual machines. In: IEEE Symposium on Security and Privacy, SP 2006, pp. 314\u2013327. IEEE Computer Society (2006)","key":"29_CR12","DOI":"10.1109\/SP.2006.38"},{"unstructured":"Nguyen, A.-Q., Takefuji, Y.: A novel approach for a file-system integrity monitor tool of xen virtual machine. In: Bao, F., Miller, S. (eds.) ASIACCS, ACM (2007)","key":"29_CR13"},{"key":"29_CR14","first-page":"31","volume-title":"1st Workshop on Virtualization in Mobile Computing, MobiVirt 2008","author":"J. Oberheide","year":"2008","unstructured":"Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized in-cloud security services for mobile devices. In: 1st Workshop on Virtualization in Mobile Computing, MobiVirt 2008, pp. 31\u201335. ACM, New York (2008)"},{"issue":"1","key":"29_CR15","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MSP.2009.5","volume":"7","author":"P.A. Porras","year":"2009","unstructured":"Porras, P.A.: Directions in network-based security monitoring. IEEE Security & Privacy\u00a07(1), 82\u201385 (2009)","journal-title":"IEEE Security & Privacy"},{"unstructured":"Santos, N., Gummadi, K.P., Rodrigues, R.: Towards trusted cloud computing. In: Proceedings of the 2009 Conference on Hot Topics in Cloud Computing, HotCloud 2009. USENIX Association, Berkeley (2009)","key":"29_CR16"},{"doi-asserted-by":"crossref","unstructured":"Shen, Z., Li, L., Yan, F., Wu, X.: Cloud computing system based on trusted computing platform. In: International Conference on Intelligent Computation Technology and Automation, ICICTA 2010, vol.\u00a001. IEEE Computer Society (2010)","key":"29_CR17","DOI":"10.1109\/ICICTA.2010.724"},{"unstructured":"Thakar, N.: Botnets remain a leading threat (2013), https:\/\/blogs.mcafee.com\/business\/security-connected\/tackling-the-botnet-threat","key":"29_CR18"},{"issue":"10","key":"29_CR19","first-page":"2397","volume":"7","author":"H. Wang","year":"2012","unstructured":"Wang, H., Zhou, H., Wang, C.: Virtual machine-based intrusion detection system framework in cloud computing environment. JCP\u00a07(10), 2397\u20132403 (2012)","journal-title":"JCP"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2014: Parallel Processing Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14325-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T00:19:09Z","timestamp":1747181949000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-14325-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319143248","9783319143255"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14325-5_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}