A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
|
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
  • [1] Intrusion detection based on Hidden Markov Model
    Yin, QB
    Shen, LR
    Zhang, RB
    Li, XY
    Wang, HQ
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 3115 - 3118
  • [2] Hidden Markov model based intrusion detection
    Liu, Zhi-Yong
    Qiao, Hong
    INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3917 : 169 - 170
  • [3] The prediction role of Hidden Markov Model in Intrusion Detection
    Gao, F
    Sun, J
    Wei, Z
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 893 - 896
  • [4] Hidden Markov Model Based Anomaly Intrusion Detection
    Jain, Ruchi
    Abouzakhar, Nasser S.
    2012 INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS, 2012, : 528 - 533
  • [5] ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    Chen, Chia-Mei
    Guan, Dah-Jyh
    Huang, Yu-Zhi
    Ou, Ya-Hui
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2016, 12 (02): : 569 - 580
  • [6] A systematic review on intrusion detection based on the Hidden Markov Model
    Ramaki, Ali Ahmadian
    Rasoolzadegan, Abbas
    Jafari, Abbas Javan
    STATISTICAL ANALYSIS AND DATA MINING, 2018, 11 (03) : 111 - 134
  • [7] Bayesian event detection for sport games with hidden Markov model
    Shigeru Motoi
    Toshie Misu
    Yohei Nakada
    Tomohiro Yazaki
    Go Kobayashi
    Takashi Matsumoto
    Nobuyuki Yagi
    Pattern Analysis and Applications, 2012, 15 : 59 - 72
  • [8] Bayesian event detection for sport games with hidden Markov model
    Motoi, Shigeru
    Misu, Toshie
    Nakada, Yohei
    Yazaki, Tomohiro
    Kobayashi, Go
    Matsumoto, Takashi
    Yagi, Nobuyuki
    PATTERN ANALYSIS AND APPLICATIONS, 2012, 15 (01) : 59 - 72
  • [9] Attack Sequence Detection in Cloud Using Hidden Markov Model
    Chen, Chia-Mei
    Guan, D. J.
    Huang, Yu-Zhi
    Ou, Ya-Hui
    PROCEEDINGS OF THE 2012 SEVENTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2012), 2012, : 100 - 103
  • [10] Research of IOT Intrusion Detection System Based on Hidden Markov Model
    Jiang, Xuesong
    Wei, Xiumei
    Wang, Xingang
    2011 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND APPLICATIONS, 2011, : 151 - 155