2018
DOI: 10.1007/978-981-13-3582-2_3
|View full text |Cite
|
Sign up to set email alerts
|

Temporal and Stochastic Modelling of Attacker Behaviour

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 11 publications
0
4
0
Order By: Relevance
“…There are few previous works which did predictive analysis on attacker behavior.. Rade et al [26] modeled honeypot data using semisupervised Markov Chains and Hidden Markov Models (HMM). They also explored Long Short-Term Memory (LSTM) for attack sequence modeling.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are few previous works which did predictive analysis on attacker behavior.. Rade et al [26] modeled honeypot data using semisupervised Markov Chains and Hidden Markov Models (HMM). They also explored Long Short-Term Memory (LSTM) for attack sequence modeling.…”
Section: Related Workmentioning
confidence: 99%
“…Deshmukh et al [27] extended the work by Rade et al [26] to propose Fusion Hidden Markov Model (FHMM) for modeling attacker behavior. FHMM is more noise resistant and provides faster performance than Deep Recurrent Neural Network (DeepRNN) with comparative accuracy in their analysis.…”
Section: Related Workmentioning
confidence: 99%
“…Lastly, Shrivastava, Bashir and Hota (2019) focus on classifying types of attacks from commands using a series of machine learning techniques. The second class of approaches analyses attacker behaviour from session data using Hidden Markov Models, as seen in the studies of Rade et al (2018) and Deshmukh, Rade and Kazi (2019). However, none of the aforementioned studies consider topic modelling approaches for the analysis of sessions.…”
mentioning
confidence: 99%
“…According to the second approach, in [30], the authors used the honeypot technology. The detailed description of attack features logged and dataset description, when using the honeypot technology, is provided in [55]. The analysis is based on the following assumption: the data are grouped by session ID for considering that the attacker attempts to implement some malicious scenario in one session, that is, different session IDs are independent of individual attacker characteristics.…”
mentioning
confidence: 99%