Probabilistic analysis of security attacks in cloud environment using hidden Markov models

被引:6
|
作者
Al-Karaki, Jamal N. [1 ,2 ]
Gawanmeh, Amjad [3 ]
Almalkawi, Islam T. [1 ]
Alfandi, Omar [4 ]
机构
[1] Hashemite Univ, Dept Comp Engn, Zarka, Jordan
[2] Abu Dhabi Polytech, Dept Informat Secur Engn Technol, Abu Dhabi, U Arab Emirates
[3] Univ Dubai, Coll Engn & IT, Dubai, U Arab Emirates
[4] Zayed Univ, Coll Technol Innovat, Abu Dhabi, U Arab Emirates
关键词
CHALLENGES; MANAGEMENT; THREATS;
D O I
10.1002/ett.3915
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The rapidly growing cloud computing paradigm provides a cost-effective platform for storing, sharing, and delivering data and computation through internet connectivity. However, one of the biggest barriers for massive cloud adoption is the growing cybersecurity threats/risks that influence its confidence and feasibility. Existing threat models for clouds may not be able to capture complex attacks. For example, an attacker may combine multiple security vulnerabilities into an intelligent, persistent, and sequence of attack behaviors that will continuously act to compromise the target on clouds. Hence, new models for detection of complex and diversified network attacks are needed. In this article, we introduce an effective threat modeling approach that has the ability to predict and detect the probability of occurrence of various security threats and attacks within the cloud environment using hidden Markov models (HMMs). The HMM is a powerful statistical analysis technique and is used to create a probability matrix based on the sensitivity of the data and possible system components that can be attacked. In addition, the HMM is used to provide supplemental information to discover a trend attack pattern from the implicit (or hidden) raw data. The proposed model is trained to identify anomalous sequences or threats so that accurate and up-to-date information on risk exposure of cloud-hosted services are properly detected. The proposed model would act as an underlying framework and a guiding tool for cloud systems security experts and administrators to secure processes and services over the cloud. The performance evaluation shows the effectiveness of the proposed approach to find attack probability and the number of correctly detected attacks in the presence of multiple attack scenarios.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Probabilistic face authentication using Hidden Markov Models
    Bicego, M
    Grosso, E
    Tistarelli, M
    [J]. BIOMETRIC TECHNOLOGY FOR HUMAN IDENTIFICATION II, 2005, 5779 : 299 - 306
  • [2] Probabilistic Resilience in Hidden Markov Models
    Panerati, Jacopo
    Beltrame, Giovanni
    Schwind, Nicolas
    Zeltner, Stefan
    Inoue, Katsumi
    [J]. 4TH INTERNATIONAL CONFERENCE ON MANUFACTURING, OPTIMIZATION, INDUSTRIAL AND MATERIAL ENGINEERING (MOIME 2016), 2016, 131
  • [3] Learning to Learn Sequential Network Attacks Using Hidden Markov Models
    Chadza, Timothy
    Kyriakopoulos, Konstantinos G.
    Lambotharan, Sangarapillai
    [J]. IEEE ACCESS, 2020, 8 (08): : 134480 - 134497
  • [4] Detection of shape anomalies: A probabilistic approach using hidden Markov models
    Liu, Zheng
    Yu, Jeffrey Xu
    Chen, Lei
    Wu, Di
    [J]. 2008 IEEE 24TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2008, : 1325 - +
  • [5] A PROBABILISTIC APPROACH FOR HEART RATE VARIABILITY ANALYSIS USING EXPLICIT DURATION HIDDEN MARKOV MODELS
    Gao, Ju
    Teng, Diyan
    Ertin, Emre
    [J]. 2018 IEEE STATISTICAL SIGNAL PROCESSING WORKSHOP (SSP), 2018, : 273 - 277
  • [7] Sensing attacks in computers networks with Hidden Markov Models
    Ariu, Davide
    Giacinto, Giorgio
    Perdisci, Roberto
    [J]. MACHINE LEARNING AND DATA MINING IN PATTERN RECOGNITION, PROCEEDINGS, 2007, 4571 : 449 - +
  • [8] Defending DDoS attacks using Hidden Markov models and cooperative reinforcement learning
    Xu, Xin
    Sun, Yongqiang
    Huang, Zunguo
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, 2007, 4430 : 196 - +
  • [9] IP-traceback based attacker tracking: A probabilistic technique for detecting Internet attacks using the concept of hidden Markov models
    Varanasi, R
    Phoha, VV
    Joshi, S
    [J]. PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 438 - 439
  • [10] Security Threats/Attacks Present in Cloud Environment
    Munir, Kashif
    Palaniappan, Sellapan
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 107 - 114