2009
DOI: 10.1109/mnet.2009.4804323
|View full text |Cite
|
Sign up to set email alerts
|

A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection

Abstract: ntrusion detection has now been widely accepted as an essential component in a decent security system. This is due to the fact that the task of preventing all attacks is impossible. Intrusion detection can detect malicious attacks that have penetrated preventative mechanisms such as firewalls, which can help provide damage assessment, response, deterrence, and prosecution support.Denning's pioneering work [1] has established the most fundamental principle that the majority of intrusion detection systems (IDSs)… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
58
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 152 publications
(60 citation statements)
references
References 10 publications
0
58
0
Order By: Relevance
“…Anomaly detection is then conducted through the comparison of the associated probability derived from the sequence observed with a predefined threshold. In a hidden Markov model, the states are not observable but when a state is visited an observation is recorded that is a probabilistic function of the state [27]. In the cloud HMM have been employed for host-based IDS in [28].…”
Section: Markov Modelsmentioning
confidence: 99%
“…Anomaly detection is then conducted through the comparison of the associated probability derived from the sequence observed with a predefined threshold. In a hidden Markov model, the states are not observable but when a state is visited an observation is recorded that is a probabilistic function of the state [27]. In the cloud HMM have been employed for host-based IDS in [28].…”
Section: Markov Modelsmentioning
confidence: 99%
“…Markov property refers to the memoryless property of a stochastic process [54,55]. Covert channel model is such a stochastic process that the next state depends only upon the current state and has nothing to do with the previous status.…”
Section: Markov Detection Algorithmmentioning
confidence: 99%
“…[12]also used HMM for the fact that the process behavior has the feature of HMM, and program execution states can be taken as the hidden states in HMM. Because of the performance of HMM authors in [13] introduced a new approach where array of HMM were used for detection of anomalous behavior. authors of [14] proposed detection of intrusion in complete session whereas others were limited to only single application.…”
Section: Fig 1 Construction Of Normal Behavior Fig 2 Mechanism Of Pmentioning
confidence: 99%