A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
|
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
  • [1] Intrusion detection based on Hidden Markov Model
    Yin, QB
    Shen, LR
    Zhang, RB
    Li, XY
    Wang, HQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118
  • [2] ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    Chen, Chia-Mei
    Guan, Dah-Jyh
    Huang, Yu-Zhi
    Ou, Ya-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (02): : 569 - 580
  • [3] A systematic review on intrusion detection based on the Hidden Markov Model
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    Jafari, Abbas Javan
    STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (03) : 111 - 134
  • [4] Hidden Markov Model Based Anomaly Intrusion Detection
    Jain, Ruchi
    Abouzakhar, Nasser S.
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 528 - 533
  • [5] Attack Sequence Detection in Cloud Using Hidden Markov Model
    Chen, Chia-Mei
    Guan, D. J.
    Huang, Yu-Zhi
    Ou, Ya-Hui
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 100 - 103
  • [6] Cross-Layer Hidden Markov Analysis for Intrusion Detection
    Venkatachalam, K.
    Prabu, P.
    Balaji, B. Saravana
    Kang, Byeong-Gwon
    Nam, Yunyoung
    Abouhawwash, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3685 - 3700
  • [7] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Wei, Xiumei
    Jiang, Xuesong
    Wang, Xingang
    INFORMATION TECHNOLOGY APPLICATIONS IN INDUSTRY, PTS 1-4, 2013, 263-266 : 2949 - 2952
  • [8] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Jiang, Xuesong
    Wei, Xiumei
    Wang, Xingang
    2011 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2011, : 151 - 155
  • [9] Mobile agent based intrusion detection system adopting Hidden Markov Model
    Lee, Do-hyeon
    Kim, Doo-young
    Jung, Jae-il
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 122 - 130
  • [10] An anomaly intrusion detection Based on Hidden Markov model System Call Sequenc
    Wang, Dongliang
    Wang, Zhigang
    ADVANCED RESEARCH ON AUTOMATION, COMMUNICATION, ARCHITECTONICS AND MATERIALS, PTS 1 AND 2, 2011, 225-226 (1-2): : 609 - +