2019 17th International Conference on Privacy, Security and Trust (PST) 2019
DOI: 10.1109/pst47121.2019.8949035
|View full text |Cite
|
Sign up to set email alerts
|

Contemporary Sequential Network Attacks Prediction using Hidden Markov Model

Abstract: Intrusion prediction is a key task for forecasting network intrusions. Intrusion detection systems have been primarily deployed as a first line of defence in a network, however; they often suffer from practical testing and evaluation due to unavailability of rich datasets. This paper evaluates the detection accuracy of determining all states (AS), the current state (CS), and the prediction of next state (NS) of an observation sequence, using the two conventional Hidden Markov Model (HMM) training algorithms, n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 28 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…The method of encrypted IoT traffics identification based on HMM (Hidden Markov Model) extracts the behavior characteristics from a time-sequence change perspective instead of a local one [25]. The behavior characteristics are implied in the process of data packages flowing into and out of the devices, which can be modeled with HMM.…”
Section: A Methods Base On Time-sequence Behavior Analysismentioning
confidence: 99%
“…The method of encrypted IoT traffics identification based on HMM (Hidden Markov Model) extracts the behavior characteristics from a time-sequence change perspective instead of a local one [25]. The behavior characteristics are implied in the process of data packages flowing into and out of the devices, which can be modeled with HMM.…”
Section: A Methods Base On Time-sequence Behavior Analysismentioning
confidence: 99%
“…Also, there have been many studies using session management [21], [22]. There have been studies that use metadata such as session generation time, packet size, and packet reception time to generate features at the packet layer and use them for machine learning, or create features at the session layer and use them for machine learning [23].…”
Section: Studies Of Security Challengesmentioning
confidence: 99%
“…Furthermore, variations of an original experiment may be performed on the same dataset. However, providing [17] 97.00 n/a n/a n/a Chastikova and Sotnikov [18] n/a n/a n/a n/a D'hooge et al [ these scores may be valuable for future comparative research. Table 3 provides an alphabetical listing by author of the papers discussed in this section, along with the proposed respective model(s) for CICIDS2018, and Table 4 shows the same ordered listing by author coupled with the associated computing environment(s) for CICIDS2018.…”
Section: Research Papers Using Cicids2018mentioning
confidence: 99%