2010 IEEE International Conference on Wireless Communications, Networking and Information Security 2010
DOI: 10.1109/wcins.2010.5541790
|View full text |Cite
|
Sign up to set email alerts
|

A novel hidden Markov model for detecting complicate network attacks

Abstract: It is difficult to detect complicate network attacks effectively nowadays. To detect these attacks the inherent characteristics of complicate network attacks are analyzed in detail. A novel hidden Markov model is proposed. The model is composed of several different monitors. In order to simplify the training procedure of the model and to improve its response performance warning events are classified into different types at first. Then the sequences of warning event types from different network monitors are cor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…[6] present an intrusion detection system where based on system calls, Zihui et al [7] is based on a set of data of system calls, Zeng et al [13] worked on reduction of a set of observations, Li et al. [14] used a fuzzy approach, Lee et al [20] perform Intrusion detection based on mobile agents, Zhicai et al [10] present an approach based on the discrete steps of the attacker or malware, and Khanna et al [22] work used functions of multigaussian mixture on sequences of observation. -HMMs used on Anomaly Deteccion Systems.…”
Section: Hmms Applied To Anomaly Detectionmentioning
confidence: 99%
“…[6] present an intrusion detection system where based on system calls, Zihui et al [7] is based on a set of data of system calls, Zeng et al [13] worked on reduction of a set of observations, Li et al. [14] used a fuzzy approach, Lee et al [20] perform Intrusion detection based on mobile agents, Zhicai et al [10] present an approach based on the discrete steps of the attacker or malware, and Khanna et al [22] work used functions of multigaussian mixture on sequences of observation. -HMMs used on Anomaly Deteccion Systems.…”
Section: Hmms Applied To Anomaly Detectionmentioning
confidence: 99%
“…This system use a network monitor distributing in sharing network to detect and filter packets, and the network monitor is using distributed network intrusion detection system [3][4] to detect message. In order to give an accurately alarm to attack messages, and try to reduce error rate, use misuse detection system, its principle is that matching the messages with the known attack signature, so can reduce false rate, but the shortcoming of this method is that is can do nothing to the new attack.…”
Section: The Traccback Attack Of System Modelmentioning
confidence: 99%