A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud

被引:4
|
作者
Narwal, Priti [1 ]
Kumar, Deepak [1 ]
Singh, Shailendra N. [1 ]
机构
[1] Amity Univ Uttar Pradesh, Noida, India
关键词
Cloud Computing; Hidden Markov Model; Intrusion Detection; Markov Game; Network; Security; Wire-Shark; ATTACKS;
D O I
10.4018/JCIT.2019100102
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.
引用
收藏
页码:14 / 26
页数:13
相关论文
共 50 条
  • [21] Cross-Layer Hidden Markov Analysis for Intrusion Detection
    Venkatachalam, K.
    Prabu, P.
    Balaji, B. Saravana
    Kang, Byeong-Gwon
    Nam, Yunyoung
    Abouhawwash, Mohamed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (02): : 3685 - 3700
  • [22] Modeling program behaviors by hidden Markov models for intrusion detection
    Wang, W
    Guan, XH
    Zhang, XL
    PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2830 - 2835
  • [23] HMMPayl: An intrusion detection system based on Hidden Markov Models
    Ariu, Davide
    Tronci, Roberto
    Giacinto, Giorgio
    COMPUTERS & SECURITY, 2011, 30 (04) : 221 - 241
  • [24] Intrusion Detection Analysis of CTCS Wireless Communication System Based on Hidden Markov Model
    Xie Y.
    Tian Q.
    1600, Science Press (43): : 73 - 80
  • [25] Multi-stage intrusion detection system using Hidden Markov Model algorithm
    Lee, Do-hyeon
    Kim, Doo-young
    Jung, Jae-il
    ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 72 - 77
  • [26] Fight Detection Based On Hidden Markov Model
    Liu, Dejian
    Wu, Jinyong
    Wang, Yike
    Wang, Jun
    Gong, Zhuo
    2012 IEEE FIFTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTATIONAL INTELLIGENCE (ICACI), 2012, : 658 - 661
  • [27] A Hidden Markov Model for Vehicle Detection and Counting
    Miller, Nicholas
    Thomas, Mohan A.
    Eichel, Justin A.
    Mishra, Akshaya
    2015 12TH CONFERENCE ON COMPUTER AND ROBOT VISION CRV 2015, 2015, : 269 - 276
  • [28] Detection of Violence Based on Hidden Markov Model
    Lu Hui-qing
    Zhu Weinan
    Zhou Yuchao
    MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 4651 - 4655
  • [29] Workload hidden Markov model for anomaly detection
    Garcia, Juan Manuel
    Navarrete, Tomas
    Orozco, Carlos
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : 56 - +
  • [30] Multiuser Detection Using Hidden Markov Model
    Chen, Fangjiong
    Kwong, Sam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2009, 58 (01) : 107 - 115