36th Annual Hawaii International Conference on System Sciences, 2003. Proceedings of The 2003
DOI: 10.1109/hicss.2003.1174909
|View full text |Cite
|
Sign up to set email alerts
|

Applications of hidden Markov models to detecting multi-stage network attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
66
0
1

Year Published

2006
2006
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(67 citation statements)
references
References 12 publications
0
66
0
1
Order By: Relevance
“…The main disadvantage of previous attempts to attack prediction discussed in related work (e.g., [6,12,15]) was their reliance on an attack library, i.e., a database of possible attacks described in details in machine-readable format. Such library is very hard to create and maintain manually as the threat landscape is continuously evolving in a rapid pace, the detection capabilities in the network might be insufficient to capture all the security events, and even the set of expected attacks may not overlap with the set of actual ongoing attacks.…”
Section: Mining the Attack Prediction Rulesmentioning
confidence: 99%
See 2 more Smart Citations
“…The main disadvantage of previous attempts to attack prediction discussed in related work (e.g., [6,12,15]) was their reliance on an attack library, i.e., a database of possible attacks described in details in machine-readable format. Such library is very hard to create and maintain manually as the threat landscape is continuously evolving in a rapid pace, the detection capabilities in the network might be insufficient to capture all the security events, and even the set of expected attacks may not overlap with the set of actual ongoing attacks.…”
Section: Mining the Attack Prediction Rulesmentioning
confidence: 99%
“…Early approaches used predefined models of attack scenarios. Such models could be attack graphs [12][13][14], Bayesian networks [6], or Markov models [15,16], to cite the most relevant contributions. If a series of detected events corresponds to a part of an attack scenario in the model, the remaining parts of the scenario can be predicted.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…[37] compared the performance of a selection of neural network architectures for statistical anomaly detection to datasets from four different scenarios. The use of hidden Markov models to detect complex multistage Internet attacks that occur over extended periods of time is described by [38]. An event classification scheme based on Bayesian networks is proposed by [39].…”
Section: Related Workmentioning
confidence: 99%
“…Ourston et al [8] have used a HMM based model to detect complex network attacks that happens in various stages. They use HMM to model alert sequences that were raised between every source/destination IP pair.…”
Section: Related Workmentioning
confidence: 99%