A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks

F. Mukoko, V. Thada
{"title":"A Primer on Intelligent Defense Mechanism to Counter Cloud Silent Attacks","authors":"F. Mukoko, V. Thada","doi":"10.1109/IC3I44769.2018.9007279","DOIUrl":null,"url":null,"abstract":"Cloud security is a key to both Cloud clients and vendors, and this has prodded intensified massive research around this domain. The contractual continuous Cloud security research is as well fuelled by the abrupt popping up of attacks that even extend to silent or stealth. Moreover these silent or stealth attacks are characterised by low observability along with bad traceability resulting in their difficulty detection, traceability and prevention. Due to the nature of silent or stealth attacks that have difficulty detection, traceability and prevention calibre, it means traditional and/or ordinary security mechanisms won’t be sufficient to compact such attacks. In turn the nearby remedy to tackle these attacks is to incorporate method(s) that can curb trends that has hidden patterns. This then calls for techniques that have capabilities for revealing hidden patterns, thus Hidden Markov Model will find its projected usage in the proposed model. As a way to offer maximum security when dealing with these sophisticated kinds of attacks, a conjuncture of cryptography will also be fused in the proposed model. A logical series of actions will be executed such that once a possible attack is sensed, then a proactive action is triggered to avoid an invasion by this attack. The intelligence is derived from the previously learning by Hidden Markov Model, although continuous active learning is still guaranteed as this algorithm carries the Machine Learning algorithm standards, along with the proactive action is triggered.","PeriodicalId":161694,"journal":{"name":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 3rd International Conference on Contemporary Computing and Informatics (IC3I)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IC3I44769.2018.9007279","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Cloud security is a key to both Cloud clients and vendors, and this has prodded intensified massive research around this domain. The contractual continuous Cloud security research is as well fuelled by the abrupt popping up of attacks that even extend to silent or stealth. Moreover these silent or stealth attacks are characterised by low observability along with bad traceability resulting in their difficulty detection, traceability and prevention. Due to the nature of silent or stealth attacks that have difficulty detection, traceability and prevention calibre, it means traditional and/or ordinary security mechanisms won’t be sufficient to compact such attacks. In turn the nearby remedy to tackle these attacks is to incorporate method(s) that can curb trends that has hidden patterns. This then calls for techniques that have capabilities for revealing hidden patterns, thus Hidden Markov Model will find its projected usage in the proposed model. As a way to offer maximum security when dealing with these sophisticated kinds of attacks, a conjuncture of cryptography will also be fused in the proposed model. A logical series of actions will be executed such that once a possible attack is sensed, then a proactive action is triggered to avoid an invasion by this attack. The intelligence is derived from the previously learning by Hidden Markov Model, although continuous active learning is still guaranteed as this algorithm carries the Machine Learning algorithm standards, along with the proactive action is triggered.
应对云静默攻击的智能防御机制初探
云安全对于云客户端和供应商来说都是一个关键,这也推动了围绕这一领域的大量研究。由于突然出现的攻击甚至延伸到沉默或隐形,合同持续的云安全研究也受到了推动。此外,这些沉默或隐形攻击的特点是可观察性低,可追溯性差,导致其难以检测,可追溯性和预防。由于沉默或隐形攻击的性质难以检测,可追溯性和预防口径,这意味着传统和/或普通的安全机制将不足以压缩此类攻击。反过来,解决这些攻击的近期补救措施是结合可以抑制具有隐藏模式的趋势的方法。这就需要有能力揭示隐藏模式的技术,因此隐马尔可夫模型将在提议的模型中找到它的预期用途。作为在处理这些复杂类型的攻击时提供最大安全性的一种方法,在所提出的模型中还将融合加密技术。一旦感知到可能的攻击,将执行一系列合乎逻辑的操作,然后触发主动操作以避免该攻击的入侵。智能来源于隐马尔可夫模型之前的学习,但由于该算法带有机器学习算法标准,因此仍然保证了持续的主动学习,同时触发了主动行为。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信