CN103699842A - 一种基于细胞神经网络的虚拟机安全监控方法 - Google Patents
一种基于细胞神经网络的虚拟机安全监控方法 Download PDFInfo
- Publication number
- CN103699842A CN103699842A CN201310736958.2A CN201310736958A CN103699842A CN 103699842 A CN103699842 A CN 103699842A CN 201310736958 A CN201310736958 A CN 201310736958A CN 103699842 A CN103699842 A CN 103699842A
- Authority
- CN
- China
- Prior art keywords
- virtual machine
- neural network
- state
- cell
- centerdot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310736958.2A CN103699842A (zh) | 2013-12-25 | 2013-12-25 | 一种基于细胞神经网络的虚拟机安全监控方法 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310736958.2A CN103699842A (zh) | 2013-12-25 | 2013-12-25 | 一种基于细胞神经网络的虚拟机安全监控方法 |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103699842A true CN103699842A (zh) | 2014-04-02 |
Family
ID=50361366
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310736958.2A Pending CN103699842A (zh) | 2013-12-25 | 2013-12-25 | 一种基于细胞神经网络的虚拟机安全监控方法 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103699842A (zh) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224872A (zh) * | 2015-09-30 | 2016-01-06 | 河南科技大学 | 一种基于神经网络聚类的用户异常行为检测方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118437A (zh) * | 2011-01-17 | 2011-07-06 | 浪潮(北京)电子信息产业有限公司 | 一种基于Xen的虚拟机热迁移进度监控方法及装置 |
CN103365702A (zh) * | 2013-07-11 | 2013-10-23 | 中国科学院合肥物质科学研究院 | IaaS云环境下轻量级虚拟机进程追踪系统和方法 |
-
2013
- 2013-12-25 CN CN201310736958.2A patent/CN103699842A/zh active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102118437A (zh) * | 2011-01-17 | 2011-07-06 | 浪潮(北京)电子信息产业有限公司 | 一种基于Xen的虚拟机热迁移进度监控方法及装置 |
CN103365702A (zh) * | 2013-07-11 | 2013-10-23 | 中国科学院合肥物质科学研究院 | IaaS云环境下轻量级虚拟机进程追踪系统和方法 |
Non-Patent Citations (4)
Title |
---|
KANG XIE等: "Research of Hierarchical Intrusion Detection Model Based on Discrete Cellular Neural Networks", 《JOURNAL OF INFORMATION & COMPUTATIONAL SCIENCE》 * |
王凯等: "Xen虚拟CPU空闲调度算法", 《计算机研究与发展》 * |
王宏霞等: "细胞神经网络的动力学行为", 《物理学报》 * |
郭翠英等: "基于神经网络的入侵检测模型", 《太原理工大学学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224872A (zh) * | 2015-09-30 | 2016-01-06 | 河南科技大学 | 一种基于神经网络聚类的用户异常行为检测方法 |
CN105224872B (zh) * | 2015-09-30 | 2018-04-13 | 河南科技大学 | 一种基于神经网络聚类的用户异常行为检测方法 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Tian et al. | A real-time correlation of host-level events in cyber range service for smart campus | |
Huda et al. | Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data | |
Chen et al. | A cloud computing based network monitoring and threat detection system for critical infrastructures | |
John et al. | Graph convolutional networks for android malware detection with system call graphs | |
Kumara et al. | Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM | |
Amato et al. | Improving security in cloud by formal modeling of IaaS resources | |
BR102015017215A2 (pt) | método implementado em computador para classificação de aplicativos móveis, e, programa de computador codificado em um meio de armazenamento não-trasitório | |
Zegzhda et al. | Applying deep learning techniques for Android malware detection | |
Nazarenko et al. | Survey on security and privacy issues in cyber physical systems | |
KR20150138229A (ko) | 하드웨어-기반 마이크로-아키텍처 데이터를 이용한 이상 프로그램 실행의 검출 | |
Mishra et al. | KVMInspector: KVM Based introspection approach to detect malware in cloud environment | |
US11973771B2 (en) | System and method for security in Internet-of-Things and cyber-physical systems based on machine learning | |
Yan et al. | A survey of adversarial attack and defense methods for malware classification in cyber security | |
Naseer et al. | Malware detection: issues and challenges | |
Pandey et al. | Performance of malware detection tools: A comparison | |
Zhang et al. | MALDC: a depth detection method for malware based on behavior chains | |
CN115904605A (zh) | 软件防御方法以及相关设备 | |
Zhang et al. | A defense framework against malware and vulnerability exploits | |
CN103699842A (zh) | 一种基于细胞神经网络的虚拟机安全监控方法 | |
Korkin et al. | Acceleration of statistical detection of zero-day malware in the memory dump using CUDA-enabled GPU hardware | |
Yuan et al. | Research of intrusion detection system on android | |
Wang et al. | An effective approach for malware detection and explanation via deep learning analysis | |
Zhao et al. | Gan-enabled code embedding for reentrant vulnerabilities detection | |
Robert et al. | Practical approaches towards securing edge devices in smart grid | |
Nadim et al. | Kernel-level rootkit detection, prevention and behavior profiling: a taxonomy and survey |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C53 | Correction of patent of invention or patent application | ||
CB03 | Change of inventor or designer information |
Inventor after: Wang Lijin Inventor after: Xu Qin Inventor after: Li Rong Inventor after: Zhu Yantao Inventor after: Feng Guiyong Inventor after: Xie Kang Inventor before: Xie Kang Inventor before: Wang Lijin Inventor before: Zhang Ling Inventor before: Xu Qin Inventor before: Li Wei Inventor before: Li Xing Inventor before: Zhong Jingxue |
|
COR | Change of bibliographic data |
Free format text: CORRECT: INVENTOR; FROM: XIE KANG WANG LIJIN ZHANG LING XU QIN LI WEI LI XING ZHONG JINGXUE TO: WANG LIJIN XU QIN LI RONG ZHU YANTAO FENG GUIYONG XIE KANG |
|
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20140402 |
|
WD01 | Invention patent application deemed withdrawn after publication |