The development of the cloud makes virtual machines a growing target for malware attacks. Virtual Environments are the legitimate target of Advanced Persistent Threats creating an undetected presence to gain access to sensitive data over a certain period. Rootkit is hidden in some arbitrary files accessed while opening and can modify or delete the data in the targeted system. In the proposed model the features are derived from the network attributes applied to the Artificial Neural Network of the private cloud. The classification is based on the anomaly detection of data in the cloud. Neural networks divide the network attributes and categorize them into two classes Benign and Root-Kit. Satisfactory results may be obtained from the mathematical models using security metrics due to their reliance on empirical data, qualitative methodologies, and compliance testing. The results show the high accuracy of detecting the rootkit malware using ANN with backward propagation.

1.
S. M. L.
de Lima
et al,
Prog. Artif. Intell.
10
,
1
22
(
2021
).
2.
L.
Liu
et al,
Phys. Procedia
33
,
852
857
(
2012
).
3.
T. P.
Anithaashri
,
A. B.
Joseph
, and
G.
Ravichandran
, “
Enhancing the Cloud Security using Novel Dominant Game Strategy
,” in
Proc. 2021 Third Int. Conf. Invent. Res. Comput. Appl. (ICIRCA, 2021)
, pp.
1507
1514
.
4.
N. T.
Le
and
D. B.
Hoang
,
J. Telecommun. Digit. Econ.
7
,
37
56
(
2019
).
5.
X.
Wang
et al,
Math. Biosci. Eng.
16
,
2650
2667
(
2019
).
6.
I.
Aljamal
et al, “
Hybrid Intrusion Detection System Using Machine Learning Techniques in Cloud Computing Environments
,” in
Proc. 2019 IEEE 17th Int. Conf. Softw. Eng. Res. Manag. Appl.
(
SERA
,
2019
), pp.
84
89
.
7.
M.
Schmidt
et al, “
A Forced Sampled Execution Approach to Kernel Rootkit Identification,
” (
2007
), pp.
219
235
.
8.
T. Y.
Win
,
H.
Tianfield
, and
Q.
Mair
, “
Detection of malware and kernel-level rootkits in cloud computing environments
,” in
Proc. 2015 IEEE 2nd Int. Conf. Cyber Secur. Cloud Comput.
(
IEEE
,
2015
), pp.
295
300
.
9.
T.
Hwang
et al, “
Design of a Hypervisor-based Rootkit Detection Method for Virtualized Systems in Cloud Computing Environments
,” in
Proc. AASRI Winter Int. Conf. Eng. Technol.
(
AASRI-WIET 2013, Atlantis Press
,
2013
).
10.
A. C.H.
Chee
and
S.
Sivanesan
,
J. Eng. Sci. Technol.
17
,
1
11
(
2022
).
11.
M.
Schmidt
et al, “
Malware Detection and Kernel Rootkit Prevention in Cloud Computing Environments
,” in
Proc. 2011 19th Int. Euromicro Conf. Parallel, Distrib. Netw.-Based Process
. (PDP,
2011
), pp.
603
610
.
12.
Wilson
,
A.
C.H.
Cheong
and
S.
Sivanesan
,
J. Eng. Sci. Technol.
17
,
203
213
(
2022
).
13.
T. Y.
Win
,
H.
Tianfield
, and
Q.
Mair
, “
Detection of Malware and Kernel-Level Rootkits in Cloud Computing Environments
,” in
Proc. 2015 IEEE 2nd Int. Conf. Cyber Secur. Cloud Comput. (CSCloud, 2015)
, pp.
295
300
.
14.
D. A.
Kumar
and
S. K.
Das
,
Int. J. Intell. Syst. Appl. Eng.
11
,
330
38
(
2023
).
15.
M. S.
Akhtar
and
T.
Feng
,
Symmetry
14
,
2304
(
2022
).
16.
Ö. A.
Aslan
and
R.
Samet
,
IEEE Access
8
,
6249
6271
(
2020
).
17.
R. B.
Hadiprakoso
,
H.
Kabetta
, and
I. K. S.
Buana
, “
Hybrid-Based Malware Analysis for Effective and Efficiency Android Malware Detection
,” in
Proc. 2020 Int. Conf. Informatics, Multimedia, Cyber Inf. Syst. (ICIMCIS, 2020)
, pp.
8
12
.
18.
T. P.
Anithaashri
,
G.
Ravichandran
,
S.
Kavuru
, and
S.
Haribabu
, “
Secure Data Access Through Electronic Devices Using Artificial Intelligence
,” in
Proc. 2018 3rd Int. Conf. Invent. Res. Comput. Appl. (ICIRCA, 2018)
, pp.
673
677
.
19.
N. A.
Kumar
,
P.
Nagarajan
,
S. K.
Selvaperumal
, and
P.
Venkatramana
, “
Design Challenges for 3 Dimensional Network-on-Chip (NoC
),” in
Lecture Notes on Data Engineering and Communication Technologies
, pp.
773
782
(
2019
).
20.
O. Z.
Salah
,
S. K.
Selvaperumal
, and
R.
Abdulla
,
Int. J. Electr. Comput. Eng.
12
, No.
4
(
2022
).
21.
D. D.
Mondal
and
M.
Alagirisamy
,
Int J Intell Syst Appl Eng
11
,
207
216
(
2023
).
22.
M.
Alagirisamy
,
B.
Pattanaik
,
R.
Redrouthu
, and
C. V.V. Muralee
Gopi
,
International Journal of Engineering Systems Modelling and Simulation
14
,
148
157
(
2023
).
This content is only available via PDF.
You do not currently have access to this content.