A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
[31]   fMRI Activation Detection by MultiScale Hidden Markov Model [J].
Nan, Fangyuan ;
Wang, Yaonan ;
Ma, Xiaoping .
BIOINFORMATICS AND COMPUTATIONAL BIOLOGY, PROCEEDINGS, 2009, 5462 :295-+
[32]   Application of Hidden Markov Model in SQL Injection Detection [J].
Li, Peng ;
Liu, Lei ;
Xu, Jing ;
Yang, Hongji ;
Yuan, Liying ;
Guo, Chenkai ;
Ji, Xiujuan .
2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, :578-583
[33]   Motor misalignment detection based on hidden markov model [J].
Wongsuwan, Tichate ;
Tangamchit, Poj ;
Prapanavarat, Cherdchai ;
Pusayatanont, Mongkol .
2006 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES,VOLS 1-3, 2006, :472-+
[34]   Hidden semi-Markov model for anomaly detection [J].
Tan, Xiaobin ;
Xi, Hongsheng .
APPLIED MATHEMATICS AND COMPUTATION, 2008, 205 (02) :562-567
[35]   LPI Emitter Detection Based on Hidden Markov Model [J].
Bayindir, Yilmaz ;
Ozkazanc, Yakup .
2020 28TH SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2020,
[36]   A protocol anomaly detection method based on optimized hidden Markov model [J].
Qiu Wei ;
Yang Yingjie ;
Wang Yongwei ;
Chang Dexian ;
Liu Jiang ;
Hu Hao .
PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 :1649-1657
[37]   Ship Communication Network Intrusion Signal Identification Based on Hidden Markov Model [J].
Wu, Weimin .
JOURNAL OF COASTAL RESEARCH, 2018, :868-871
[38]   Markov Graph Model Computation and Its Application to Intrusion Detection [J].
曾剑平 ;
郭东辉 .
JournalofDonghuaUniversity(EnglishEdition), 2007, (02) :272-275
[39]   Neural Hidden Markov Model [J].
Lin, Zuoquan ;
Song, Jiehu .
AGENTS AND ARTIFICIAL INTELLIGENCE, ICAART 2019, 2019, 11978 :37-54
[40]   Intrusion Detection in IoT Network Traffic Using Markov Model [J].
Liu, I-Hsien ;
Huang, Hsiao-Ching ;
Lee, Meng-Huan ;
Li, Jung-Shian .
SENSORS AND MATERIALS, 2024, 36 (03) :1127-1134