Title :
Attack Prediction Models for Cloud Intrusion Detection Systems
Author :
Kholidy, Hisham A. ; Erradi, Abdelkarim ; Abdelwahed, Sherif
Author_Institution :
Dept. of Comput. Sci. & Eng., Qatar Univ., Doha, Qatar
Abstract :
In spite of the functional and economic benefits of the cloud-computing systems, they also expose entirely several attacks. Most of the current cloud security technologies do not provide early warnings about such attacks. The early warnings give the cloud administrator or the auto response controller ample time to take preventive measures. This paper discusses our three prediction models that are integrated to our Autonomic Cloud Intrusion Detection Framework (ACIDF) namely, The Finite State Hidden Markov prediction model (FSHMPM), The Finite Context Prediction Model (FCPM) that uses a Variable Order Markov Model (VMM) with a Probabilistic Suffix Tree (PST), and HoltWinter Prediction Model (HWPM). We compare these models and highlight the pros and cons of each one. The prediction models were evaluated against DARPA 2000 dataset. The FSHMPM has successfully fired the early warnings 39.6 minutes before the launching of the LLDDoS1.0 attack. The FCPM has successfully fired the early warnings 58.98 minutes before the launching of the same attack. The HWPM has an error rate of 42.07% for HTTP flow forecast and 44.02% for FTP one.
Keywords :
cloud computing; computer crime; finite state machines; hidden Markov models; ACIDF; FCPM; FSHMPM; HTTP flow forecast; HWPM; HoltWinter prediction model; LLDDoS1.0 attack; PST; VMM; attack prediction models; auto response controller; autonomic cloud intrusion detection framework; cloud administrator; cloud intrusion detection systems; cloud security technologies; cloud-computing systems; early warnings; economic benefits; finite context prediction model; finite state hidden Markov prediction model; functional benefits; preventive measures; probabilistic suffix tree; variable order Markov model; Biological system modeling; Context; Context modeling; Hidden Markov models; Prediction algorithms; Predictive models; Training; Cloud computing; intrusion prediction; multi-staged attacks; HMM; VMM; Probability Suffix Tree; HoltWinter;
Conference_Titel :
Artificial Intelligence, Modelling and Simulation (AIMS), 2014 2nd International Conference on
Print_ISBN :
978-1-4799-7599-0
DOI :
10.1109/AIMS.2014.64