A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
[21]   Hidden Markov Model based Spot price prediction for Cloud Computing [J].
Liu, Duan ;
Cai, Zhicheng ;
Li, Xiaoping .
2017 15TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 16TH IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC 2017), 2017, :996-1003
[22]   Workload hidden Markov model for anomaly detection [J].
Garcia, Juan Manuel ;
Navarrete, Tomas ;
Orozco, Carlos .
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, :56-+
[23]   User Assistance for Serious Games Using Hidden Markov Model [J].
Yadav, Vivek ;
Streicher, Alexander ;
Prabhune, Ajinkya .
ADDRESSING GLOBAL CHALLENGES AND QUALITY EDUCATION, EC-TEL 2020, 2020, 12315 :380-385
[24]   HMMs (Hidden Markov models) based on anomaly intrusion detection method [J].
Gao, B ;
Ma, HY ;
Yang, YH .
2002 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-4, PROCEEDINGS, 2002, :381-385
[25]   Markov Financial Model Using Hidden Markov Model [J].
Luc Tri Tuyen .
INTERNATIONAL JOURNAL OF APPLIED MATHEMATICS & STATISTICS, 2013, 40 (10) :72-83
[26]   Cloud Computing Predictive Resource Management Framework Using Hidden Markov Model [J].
Adel, Ahmed ;
El Mougy, Amr .
2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, :205-212
[27]   Combined curvelets and hidden Markov models for human fall detection [J].
Nabil Zerrouki ;
Amrane Houacine .
Multimedia Tools and Applications, 2018, 77 :6405-6424
[28]   Combined curvelets and hidden Markov models for human fall detection [J].
Zerrouki, Nabil ;
Houacine, Amrane .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (05) :6405-6424
[29]   Apnea Detection Based on Hidden Markov Model Kernel [J].
Travieso, Carlos M. ;
Alonso, Jesus B. ;
Ticay-Rivas, Jaime R. ;
del Pozo-Banos, Marcos .
ADVANCES IN NONLINEAR SPEECH PROCESSING, 2011, 7015 :71-79
[30]   Detection of machine failure: Hidden Markov Model approach [J].
Tai, Allen H. ;
Ching, Wai-Ki ;
Chan, L. Y. .
COMPUTERS & INDUSTRIAL ENGINEERING, 2009, 57 (02) :608-619