Cloud security based attack detection using transductive learning integrated with Hidden Markov Model

Yassine Aoudni*, Cecil Donald, Ahmed Farouk, Kishan Bhushan Sahay, D. Vijendra Babu, Vikas Tripathi, Dharmesh Dhabliya

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

68 Citations (Scopus)

Abstract

In recent years, organizations and enterprises put huge attention on their network security. The attackers were able to influence vulnerabilities for the configuration of the network through the network. Zero day (0-day) is defined as vulnerable software or application that is either defined by the vendor or not patched by any vendor of organization. When zero-day attack is identified within the network there is no proper mechanism when observed. To mitigate challenges related to the zero-day attack, this paper presented HMM_TDL, a deep learning model for detection and prevention of attack in the cloud platform. The presented model is carried out in three phases like at first, Hidden Markov Model (HMM) is incorporated for the detection of attacks. With the derived HMM model, hyper alerts are transmitted to the database for attack prevention. In the second stage, a transductive deep learning model with k-medoids clustering is adopted for attack identification. With k-medoids clustering, soft labels are assigned for attack and data and update to the database. In the last phase, with computed HMM_TDL database is updated with computed trust value for attack prevention within the cloud. (c) 2022 Published by Elsevier B.V.
Original languageEnglish
Pages (from-to)16-26
Number of pages11
JournalPattern Recognition Letters
Volume157
DOIs
Publication statusPublished - May 2022
Externally publishedYes

Keywords

  • Hidden Markov Model (HMM)
  • K-medoids clustering
  • Soft labels
  • Transductive deep learning
  • Zero-day attack security

Fingerprint

Dive into the research topics of 'Cloud security based attack detection using transductive learning integrated with Hidden Markov Model'. Together they form a unique fingerprint.

Cite this