A finite state hidden markov model for predicting multistage attacks in cloud systems
Author | Kholidy, Hisham A. |
Author | Erradi, Abdlekarim |
Author | Abdelwahed, Sherif |
Author | Azab, Abdulrahman |
Available date | 2016-05-26T12:20:50Z |
Publication Date | 2014 |
Publication Name | Proceedings - 2014 World Ubiquitous Science Congress: 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, DASC 2014 |
Resource | Scopus |
Citation | H. A. Kholidy, A. Erradi, S. Abdelwahed and A. Azab, "A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems," Dependable, Autonomic and Secure Computing (DASC), 2014 IEEE 12th International Conference on, Dalian, 2014, pp. 14-19. |
ISBN | 978-1-4799-5078-2 |
Abstract | Cloud computing significantly increased the security threats because intruders can exploit the large amount of cloud resources for their attacks. However, most of the current security technologies do not provide early warnings about such attacks. This paper presents a Finite State Hidden Markov prediction model that uses an adaptive risk approach to predict multi-staged cloud attacks. The risk model measures the potential impact of a threat on assets given its occurrence probability. The attacks prediction model was integrated with our autonomous cloud intrusion detection framework (ACIDF) to raise early warnings about attacks to the controller so it can take proactive corrective actions before the attacks pose a serious security risk to the system. According to our experiments on DARPA 2000 dataset, the proposed prediction model has successfully fired the early warning alerts 39.6 minutes before the launching of the LLDDoS1.0 attack. This gives the auto response controller ample time to take preventive measures. |
Sponsor | NPRP grant # 09-778-2-299 from the Qatar National Research Fund (a member of Qatar Foundation). |
Language | en |
Publisher | IEEE |
Subject | Cloud computing Hidden Markov Models probability intrusion prevention security of data prediction of multi-staged attacks risk assessment |
Type | Conference |
Pagination | 14-19 |
Files in this item
Files | Size | Format | View |
---|---|---|---|
There are no files associated with this item. |
This item appears in the following Collection(s)
-
Computer Science & Engineering [2402 items ]