2017 IEEE International Congress on Internet of Things (ICIOT) 2017
DOI: 10.1109/ieee.iciot.2017.31
|View full text |Cite
|
Sign up to set email alerts
|

Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…One example of the sequence of transactions can be shown as llmhmlhm. The types of purchases such [13], [27], [43], [86], [93], [101], [107] [2], [34], [39], [50], [59], [113], [118] [30], [41], [77], [83] [4], [8], [17], [36], [38], [42] [6], [7], [18], [48], [74], [92] [28], [33], [40], [47], [53], [67], [71], [97], [105], [114], [116], [119] [54], [55], [112] [15], [70], [77], [95], [99], [102] [10], [44], [66] [41], [53], [56], [74],…”
Section: Credit Card Fraud Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…One example of the sequence of transactions can be shown as llmhmlhm. The types of purchases such [13], [27], [43], [86], [93], [101], [107] [2], [34], [39], [50], [59], [113], [118] [30], [41], [77], [83] [4], [8], [17], [36], [38], [42] [6], [7], [18], [48], [74], [92] [28], [33], [40], [47], [53], [67], [71], [97], [105], [114], [116], [119] [54], [55], [112] [15], [70], [77], [95], [99], [102] [10], [44], [66] [41], [53], [56], [74],…”
Section: Credit Card Fraud Detectionmentioning
confidence: 99%
“…Research on alert correlating and predicting systems based on the HMM include [28,33,40,47,53,61,67,71,97,105,114,116,119] which aim to extract and track multistep attack scenarios by analyzing the correlation between alerts created by IDS. As a detailed example, ref.…”
Section: Multistep Attack Detection and Predictionmentioning
confidence: 99%
“…It can handle uncertain and fuzzy information, providing more flexible and comprehensive prediction results. For example, methods based on hidden Markov models [22,23], fuzzy neural networks [24], and LSTM with Bayesian optimization algorithms [25] fall into this category. These methods are capable of addressing uncertain information by integrating qualitative and quantitative information for security situation prediction.…”
Section: Introductionmentioning
confidence: 99%
“…Liang W [6] et al Proposed a network security situation prediction model based on the weighted Hidden Markov Model to solve the problem that existing methods cannot make full use of historical data to predict future changes. Firstly, multi-scale entropy information is used to solve the problem of training data, then the parameters of HMM transfer matrix are optimized, and finally, the autocorrelation coefficient is used to predict the future security situation based on the correlation between the features of historical data.…”
Section: Introductionmentioning
confidence: 99%