2006
DOI: 10.1007/11856214_8
|View full text |Cite
|
Sign up to set email alerts
|

Using Hidden Markov Models to Evaluate the Risks of Intrusions

Abstract: Security-oriented risk assessment tools are used to determine the impact of certain events on the security status of a network. Most existing approaches are generally limited to manual risk evaluations that are not suitable for real-time use. In this paper, we introduce an approach to network risk assessment that is novel in a number of ways. First of all, the risk level of a network is determined as the composition of the risks of individual hosts, providing a more precise, fine-grained model. Second, we use … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
28
0

Year Published

2007
2007
2018
2018

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 62 publications
(29 citation statements)
references
References 12 publications
(17 reference statements)
0
28
0
Order By: Relevance
“…In this model, the sequence of events that match attacks signature rules in the correlation tree represents a series of state transitions with a certain probability where each event is not directly visible but output dependent on the event is visible, the output in this case is the attack phase or state. To build this model, we consider four main issues, (A) formally defining the model using some notation of [17], (B) the implementation of the model, (C) the training of the model, and (D) the evaluation of the model.…”
Section: Acidf Prediction and Early-warningsmentioning
confidence: 99%
“…In this model, the sequence of events that match attacks signature rules in the correlation tree represents a series of state transitions with a certain probability where each event is not directly visible but output dependent on the event is visible, the output in this case is the attack phase or state. To build this model, we consider four main issues, (A) formally defining the model using some notation of [17], (B) the implementation of the model, (C) the training of the model, and (D) the evaluation of the model.…”
Section: Acidf Prediction and Early-warningsmentioning
confidence: 99%
“…Due to its good performance in statistics, HMM (Hidden Markov Model) [21][22][23][24][25] technique is rapidly developed and applied in fields as voice recognition, classification, security situation prediction, intrusion detection, etc. In the field of security situation prediction, Hisham [26] proposed the first HMM model with finite state to predict the multistep attack in cloud computing system.…”
Section: Related Workmentioning
confidence: 99%
“…A further approach to risk modelling is proposed by Arnes et al [3]. They use Hidden Markov Models to evaluate the risks of intrusion, and present risk depending on IT assets, as well as define the risk level of a network as the composition of risks of individual hosts.…”
Section: Related Workmentioning
confidence: 99%