Intrusion Detection using Hidden Markov Model

The success of modern day technologies highly depends on its effectiveness of the world‘s norms, its ease of use by end users and most importantly its degree of information security and control. Cloud computing is a new and emerging information technology that changes the way of IT architectural solutions and put forward by means of moving towards the theme of virtualization of data storage, local networks (infrastructure) as well as software. Cloud computing has been envisioned as a next generation information technology (IT) paradigm for provisioning of computing services with a reduced cost and fast accessibility. It provides greater flexibility with lesser cost like on demands services, scalable network, and virtualized services to the end users[13][14]. Security threats in existing technologies and legacy will remain for intruders [14]. In this paper, different intrusion detection and prevention techniques are studies which affect availability, confidentiality and integrity of Cloud resources and services. Also examines proposals incorporating Intrusion Detection Systems (IDS) in Cloud and types of attacks. Proposal of new ideas for detection and preventions of intruders to achieve desired security in the cloud [24]. General Terms Cloud computing, Hidden Markov Model

[1]  Adel Nadjaran Toosi,et al.  A Novel Soft Computing Model Using Adaptive Neuro-Fuzzy Inference System for Intrusion Detection , 2007, 2007 IEEE International Conference on Networking, Sensing and Control.

[2]  Teresa F. Lunt,et al.  A survey of intrusion detection techniques , 1993, Comput. Secur..

[3]  Sung-Bae Cho,et al.  Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Trans. Syst. Man Cybern. Part B.

[4]  Muttukrishnan Rajarajan,et al.  A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..

[5]  Jun-jie Wang,et al.  Security issues and countermeasures in cloud computing , 2011, Proceedings of 2011 IEEE International Conference on Grey Systems and Intelligent Services.

[6]  Farzad Sabahi,et al.  Virtualization-level security in cloud computing , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[7]  Joel-Ahmed M. Mondol Cloud security solutions using FPGA , 2011, Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.

[8]  Irfan Gul,et al.  Distributed Cloud Intrusion Detection Model , 2011 .

[9]  S. T. Sarasamma,et al.  Hierarchical Kohonenen net for anomaly detection in network security , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Christopher Leckie,et al.  A survey of coordinated attacks and collaborative intrusion detection , 2010, Comput. Secur..

[11]  Sung-Bae Cho,et al.  Incorporating soft computing techniques into a probabilistic intrusion detection system , 2002, IEEE Trans. Syst. Man Cybern. Part C.

[12]  Yun Yang,et al.  Security architecture and key technologies for power cloud computing , 2011, Proceedings 2011 International Conference on Transportation, Mechanical, and Electrical Engineering (TMEE).

[13]  Debin Gao,et al.  Beyond Output Voting: Detecting Compromised Replicas Using HMM-Based Behavioral Distance , 2009, IEEE Transactions on Dependable and Secure Computing.

[14]  Shubhangi L. Vaikole,et al.  Intrusion Detection System in Cloud Computing Environment , 2012 .

[15]  John Zic,et al.  Accountability as a Service for the Cloud , 2010, 2010 IEEE International Conference on Services Computing.

[16]  Navdeep Singh,et al.  A Survey of Intrusion Detection Techniques , 2013 .

[17]  Cong Wang,et al.  Enabling Public Auditability and Data Dynamics for Storage Security in Cloud Computing , 2011, IEEE Transactions on Parallel and Distributed Systems.

[18]  Abdelwahab Hamou-Lhadj,et al.  An improved Hidden Markov Model for anomaly detection using frequent common patterns , 2012, 2012 IEEE International Conference on Communications (ICC).

[19]  Sung-Bae Cho,et al.  Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[20]  S Ramgovind,et al.  The management of security in Cloud computing , 2010, 2010 Information Security for South Africa.