A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 15 条
[1]  
Ariu D, 2007, LECT NOTES ARTIF INT, V4571, P449
[2]   HMMPayl: An intrusion detection system based on Hidden Markov Models [J].
Ariu, Davide ;
Tronci, Roberto ;
Giacinto, Giorgio .
COMPUTERS & SECURITY, 2011, 30 (04) :221-241
[3]   Using HMM in Strategic Games [J].
Benevides, Mario ;
Lima, Isaque ;
Nader, Rafael ;
Rougemont, Pedro .
ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE, 2014, (144) :73-84
[4]   Deception-Based Game Theoretical Approach to Mitigate DoS Attacks [J].
Ceker, Hayreddin ;
Zhuang, Jun ;
Upadhyaya, Shambhu ;
La, Quang Duy ;
Soong, Boon-Hee .
DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 :18-38
[5]  
Chains Markov, 2001, QUEUEING NETWORKS MA, P35, DOI [10.1002/0471200581.ch2, DOI 10.1002/0471200581.CH2]
[6]  
Fan G., 2013, 2013 IEEE International Conference on Services Computing, P659, DOI [DOI 10.1109/SCC.2013.110, 10.1109/SCC.2013.110]
[7]  
HiddenMarkov Models, INTRO HIDDEN SEMIMAR, P29, DOI [10.1017/9781108377423.004, DOI 10.1017/9781108377423.004]
[8]  
Jassim MR, 2017, INT C P2P PAR GRID C, P241, DOI DOI 10.1007/978-3-319-69835-9_23
[9]  
Narwal P., 2017, 2017 INT C INF TECHN, DOI [10.1109/ICTUS.2017.8286057, DOI 10.1109/ICTUS.2017.8286057]
[10]  
Narwal P., 2016, Proceedings of the 2nd International Conference on Information and Communication Technology for Competitive Strategies (ICTCS 2016). ACM, P5, DOI DOI 10.1145/2905055.2905152