A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
[41]   NONSTATIONARY HIDDEN MARKOV MODEL [J].
SIN, B ;
KIM, JH .
SIGNAL PROCESSING, 1995, 46 (01) :31-46
[42]   A modified hidden Markov model [J].
van der Hoek, John ;
Elliott, Robert J. .
AUTOMATICA, 2013, 49 (12) :3509-3519
[43]   A Novel Hidden Markov Model for Detecting Complicate Network Attacks [J].
Shi Zhicai ;
Xia Yongxiang .
2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, :312-315
[44]   A coarse-grained Markov chain is a hidden Markov model [J].
MacDonald, Iain L. .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2020, 541
[45]   A Hidden Markov Model-Based Method for Virtual Machine Anomaly Detection [J].
Shi, Chaochen ;
Yu, Jiangshan .
PROVABLE SECURITY, PROVSEC 2019, 2019, 11821 :372-380
[46]   Dynamic Community Detection Algorithm Based On Hidden Markov Model [J].
Dong, Zhe .
PROCEEDINGS OF THE 2016 INTERNATIONAL SYMPOSIUM ON ADVANCES IN ELECTRICAL, ELECTRONICS AND COMPUTER ENGINEERING (ISAEECE), 2016, 69 :288-294
[47]   A modified hidden Markov model for outlier detection in multivariate datasets [J].
Manoharan, G. ;
Sivakumar, K. .
INTERNATIONAL JOURNAL OF ENGINEERING SYSTEMS MODELLING AND SIMULATION, 2024, 15 (03) :121-128
[48]   Encrypted Malicious Traffic Detection Based on Hidden Markov Model [J].
Zou F.-T. ;
Yu T.-D. ;
Xu W.-L. .
Ruan Jian Xue Bao/Journal of Software, 2022, 33 (07) :2683-2698
[49]   Detection and Prediction of FDI Attacks in IoT Systems via Hidden Markov Model [J].
Moudoud, Hajar ;
Mlika, Zoubeir ;
Khoukhi, Lyes ;
Cherkaoui, Soumaya .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05) :2978-2990
[50]   A Survey on Metamorphic Malware Detection based on Hidden Markov Model [J].
Sasidharan, Satheesh Kumar ;
Thomas, Ciza .
2018 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2018, :357-362