Geometric Erudition Intended for Variance Recognition within Shade Server Organization: A Multi-Order Markov Series Structure
Keywords:
Markov processes, training methodologies, cloud computing, algorithm design and analysis, mathematical modeling, equations, and server managementAbstract
To enhance the security of IT infrastructure, especially in cloud computing platforms that host entire applications and data, anomaly detection plays a critical role. This paper introduces a multi-order Markov chain-based framework for anomaly detection, expanding upon the traditional Markov chain model. Our approach incorporates both high-order Markov chains and multivariate time series, embedded within algorithms designed under a statistical learning framework. To address time and space complexity, our algorithms employ non-zero value tables and logarithmic values in initial and transition matrices. For validation purposes, we utilized system calls and their return values from the DARPA intrusion detection evaluation dataset to construct a two-dimensional test input set. The test results indicate that our multi-order approach produces more effective indicators. Both the absolute values derived from single-order models and the changes in rankings across different-order models are strongly correlated with abnormal behaviors, thereby enhancing the detection of anomalies.
Downloads
References
Improving product marketing by predicting early reviewers on E-Commerce websites
S. Kodati, M. Dhasaratham, V. V. S. S. Srikanth, and K. M. Reddy, “Improving product marketing by predicting early reviewers on E-Commerce websites,” Deleted Journal, no. 43, pp. 17–25, Apr. 2024, doi: 10.55529/ijrise.43.17.25.
Kodati, DrSarangam, et al. “Classification of SARS Cov-2 and Non- SARS Cov-2 Pneumonia Using CNN.” Journal of Prevention, Diagnosis and Management of Human Diseases(JPDMHD)2799-1202,vol.3,no.06,23 Nov. 2023, pp. 32–40,
journal.hmjournals.com/index.php/JPDMH D/article/view/3406/2798, https://doi.org/10.55529/jpdmhd.36.32.40. Accessed 2 May 2024.
V. Srikanth, “CHRONIC KIDNEY DISEASE PREDICTION USING MACHINE LEARNING ALGORITHMS,” IJTE,pp.106–109,Jan.2023,[Online].
Available: http://ijte.uk/archive/2023/CHRONIC- KIDNEY-DISEASE-PREDICTION- USING-MACHINE-LEARNING- ALGORITHMS.pdf
V. SRIKANTH, “DETECTION OF PLAGIARISMUSINGARTIFICIAL NEURAL NETWORKS,” International JournalofTechnologyandEngineering,vol. XV, no.I, pp.201–204,Feb.2023, [Online].
Available: http://ijte.uk/archive/2023/DETECTION- OF-PLAGIARISM-USING-ARTIFICIAL- NEURAL-NETWORKS.pdf
V. SRIKANTH, “A REVIEW ON MODELING AND PREDICTING OF CYBER HACKING BREACHES,” IJTE, vol.XV,no.I,pp.300–302,Mar.2023,[Online]. Available:
http://ijte.uk/archive/2023/A-REVIEW-ON- MODELING-AND-PREDICTING-OF- CYBER-HACKING-BREACHES.pdf
S. Kodati, M. Dhasaratham, V. V. S. S. Srikanth, and K. M. Reddy, “Detection of fake currency using machine learning models,”DeletedJournal,no.41,pp.31–38, Dec. 2023, doi: 10.55529/ijrise.41.31.38.
“Cyberspace and the Law: Cyber Security.” IOK STORE, iokstore.inkofknowledge.com/product- page/cyberspace-and-the-law. Accessed 2 May2024.
“DataStructuresLaboratoryManual.” IOK STORE, www.iokstore.inkofknowledge.com/product-page/data-structures-laboratory-manual. Accessed 2 May 2024.
Data Analytics Using R Programming Lab.” IOK STORE, www.iokstore.inkofknowledge.com/product
-page/data-analytics-using-r-programming- lab. Accessed 2 May 2024.
V. Srikanth, Dr. I. Reddy, and Department of Information Technology, Sreenidhi Institute of Science and Technology, Hyderabad, 501301, India, “WIRELESS SECURITY PROTOCOLS (WEP,WPA,WPA2&WPA3),”journal-article, 2019. [Online]. Available: https://www.jetir.org/papers/JETIRDA0600 1.pdf
V. SRIKANTH, “Secured ranked keyword search over encrypted data on cloud,” IJIEMR Transactions, vol. 07, no. 02,pp.111–119,Feb.2018,[Online]. Available: https://www.ijiemr.org/public/uploads/paper /1121_approvedpaper.pdf
V. SRIKANTH, “A NOVEL METHOD FOR BUG DETECTION TECHNIQUES USING INSTANCE SELECTION AND FEATURESELECTION,”IJIEMR
Transactions, vol. 06, no. 12, pp. 337–344, Dec. 2017, [Online]. Available: https://www.ijiemr.org/public/uploads/paper /976_approvedpaper.pdf
12 . SRIKANTH MCA, MTECH, MBA, “ANALYZING THE TWEETS AND DETECT TRAFFIC FROM TWITTER ANALYSIS,”Feb.2017.[Online].
Available: http://ijmtarc.in/Papers/Current%20Papers/I JMTARC-170309.pdf
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.