CFP last date
20 May 2024
Reseach Article

Intrusion Detection using Hidden Markov Model

by Sanjay Kumar Sharma, Manish Manoria
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 115 - Number 4
Year of Publication: 2015
Authors: Sanjay Kumar Sharma, Manish Manoria
10.5120/20142-2264

Sanjay Kumar Sharma, Manish Manoria . Intrusion Detection using Hidden Markov Model. International Journal of Computer Applications. 115, 4 ( April 2015), 35-38. DOI=10.5120/20142-2264

@article{ 10.5120/20142-2264,
author = { Sanjay Kumar Sharma, Manish Manoria },
title = { Intrusion Detection using Hidden Markov Model },
journal = { International Journal of Computer Applications },
issue_date = { April 2015 },
volume = { 115 },
number = { 4 },
month = { April },
year = { 2015 },
issn = { 0975-8887 },
pages = { 35-38 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume115/number4/20142-2264/ },
doi = { 10.5120/20142-2264 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:53:53.150143+05:30
%A Sanjay Kumar Sharma
%A Manish Manoria
%T Intrusion Detection using Hidden Markov Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 115
%N 4
%P 35-38
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The success of modern day technologies highly depends on its effectiveness of the world's norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a new and emerging information technology that changes the way of IT architectural solutions and put forward by means of moving towards the theme of virtualization of data storage, local networks (infrastructure) as well as software. Cloud computing has been envisioned as a next generation information technology (IT) paradigm for provisioning of computing services with a reduced cost and fast accessibility. It provides greater flexibility with lesser cost like on demands services, scalable network, and virtualized services to the end users[13][14]. Security threats in existing technologies and legacy will remain for intruders [14]. In this paper, different intrusion detection and prevention techniques are studies which affect availability, confidentiality and integrity of Cloud resources and services. Also examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and types of attacks. Proposal of new ideas for detection and preventions of intruders to achieve desired security in the cloud [24].

References
  1. Sang-Jun Han and Sung-Bae Cho" Evolutionary Neural Networks for Anomaly Detection Based on the Behavior of a Program ",IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 36, NO. 3, JUNE 2006.
  2. Debin Gao, Michael K. Reiter and Dawn Song, "Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance", IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 6, NO 2, APRIL-JUNE 2009.
  3. Adel Nadjaran Toosi, Mohsen Kahani," A Novel Soft Computing Model Using Adaptive Neuro-Fuzzy Inference System for Intrusion Detection", Proceedings of the IEEE International Conference on Networking, Sensing and Control, London, UK, 15-17 April 2007.
  4. Afroza Sultana, Abdelwahab Hamou-Lhadj, and Mario Couture, "An Improved Hidden Markov Model for Anomaly Detection Using Frequent Common Patterns ", IEEE ICC Communication and Information Systems Security Symposium, 2012.
  5. Chenfeng Vincent Zhou, Christopher Leckie and Shanika Karunasekera," A survey of coordinated attacks and collaborative intrusion detection", computers & security , pp 124-140 2 9 (2010).
  6. Suseela T. Sarasamma, Qiuming A. Zhu, and Julie Huff, "Hierarchical Kohonenen Net for Anomaly Detection in Network Security", IEEE TRANSACTIONS ON SYSTEMS,MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 35, NO. 2, APRIL 2005.
  7. Qian Wang, Cong Wang, Kui Ren, Wenjing Lou and Jin Li, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 201.
  8. Wang Jun-jie, MuSen, "Security Issues and Countermeasures in Cloud Computing", IEEE, 2011.
  9. Farzad Sabahi, "Virtualization-Level Security in Cloud Computing", IEEE,2011.
  10. Chirag Modi, Dhiren Patel, Hiren Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan, "A survey of intrusion detection techniques in Cloud", Journal of Network and Computer Applications, 2012.
  11. S. V. Narwane, S. L. Vaikol, " Intrusion Detection System in Cloud Computing Environment", International Journal of Computer Applications, 2012.
  12. Sung-Bae Cho, "Incorporating Soft Computing Techniques Into a Probabilistic Intrusion Detection System", IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART C: APPLICATIONS AND REVIEWS, VOL. 32, NO. 2, MAY 2002.
  13. Qian Wang, Cong Wang and Kui Ren, "Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing", IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 22, NO. 5, MAY 2011.
  14. Wang Jun-jie and MuSen, "Security Issues and Countermeasures in Cloud Computing", 978-1-61284-491-6/111 2011 IEEE.
  15. Ramgovind S, Eloff MM and Smith E, "The Management of Security in Cloud Computing", 978-1-4244-5495-2/10 2010 IEEE.
  16. Yun Yang, Lie Wu and Wenping Hu, "Security Architecture and Key Technologies for Power Cloud Computing", 2011 International Conference on Transportation, Mechanical, and Electrical Engineering (TMEE) December 16-18, 978-1-4577-1701-7/11 2011 IEEE Changchun, China.
  17. Ping Wang, Wei Huang and Carlos A. Varela, "Impact of Virtual Machine Granularity on Cloud Computing Workloads Performance", 11th IEEE/ACM International Conference on Grid Computing, 978-1-4244-9349-4/10 2010 IEEE.
  18. Farzad Sabahi, "Virtualization-Level Security in Cloud Computing", 978-1-61284-486- 2/1112011 IEEE.
  19. Jinhui Yao, Shiping Chen and Chen Wang, "Accountability as a Service for the Cloud", 2010 IEEE 6th World Congress on Services.
  20. Joel-Ahmed M. Mondol, "Cloud Security Solutions using FPGA", 978-1-4577-0253-2/11 2011 IEEE.
  21. S. V. Narwane and S. L. Vaikol, "Intrusion Detection System in Cloud Computing Environment" , International Conference on Advances in Communication and Computing Technologies (ICACACT) 2012 Proceedings published by International Journal of Computer Applications® (IJCA).
  22. Irfan Gul, M. Hussain, "Distributed Cloud Intrusion Detection Model", International Journal of Advanced Science and Technology Vol. 34, September, 2011
  23. https://cloudsecurityalliance. org/
Index Terms

Computer Science
Information Sciences

Keywords

Cloud computing IDS IPS