Analysis of hidden Markov model learning algorithms for the detection and prediction of multi-stage network attacks

作者: Timothy Chadza , Konstantinos G. Kyriakopoulos , Sangarapillai Lambotharan

DOI: 10.1016/J.FUTURE.2020.03.014

关键词:

摘要: … customised rules, which were extracted from [47] and modified where applicable. Most of the customised rules are absent from default Snort IDS rules … obtained from Snort IDS. It can be …

参考文章(43)
Alexander Kott, Towards Fundamental Science of Cyber Security Network Science and Cybersecurity. pp. 1- 13 ,(2014) , 10.1007/978-1-4614-7597-2_1
Radek Píbil, Viliam Lisý, Christopher Kiekintveld, Branislav Bošanský, Michal Pěchouček, Game theoretic model of strategic honeypot selection in computer networks decision and game theory for security. pp. 201- 220 ,(2012) , 10.1007/978-3-642-34266-0_12
S.J. Nasuto, A.A.R. Sa, A.B. Soares, A.O. Andrade, Estimation of Hidden Markov Models parameters using differential evolution AISB. ,(2008)
Yu-Beng Leau, Selvakumar Manickam, Network Security Situation Prediction: A Review and Discussion soft computing. pp. 424- 435 ,(2015) , 10.1007/978-3-662-46742-8_39
Khadoudja Ghanem, Amer Draa, Elvis Vyumvuhore, Arsene Simbabawe, Differential Evolution to Optimize Hidden Markov Models Training: Application to Facial Expression Recognition computer and information technology. ,vol. 23, pp. 157- 170 ,(2015) , 10.2498/CIT.1002412
Rainer Storn, Kenneth Price, Differential Evolution – A Simple and Efficient Heuristic for Global Optimization over Continuous Spaces Journal of Global Optimization. ,vol. 11, pp. 341- 359 ,(1997) , 10.1023/A:1008202821328
Fang Huajing, Xia Lisha, Li Zefang, HMM parameters estimation with inequality constraints chinese control conference. pp. 7869- 7872 ,(2013)
Daniel Hsu, Sham M. Kakade, Tong Zhang, A spectral algorithm for learning Hidden Markov Models Journal of Computer and System Sciences. ,vol. 78, pp. 1460- 1480 ,(2012) , 10.1016/J.JCSS.2011.12.025
Zia Moghaddam, Massimo Piccardi, Training Initialization of Hidden Markov Models in Human Action Recognition IEEE Transactions on Automation Science and Engineering. ,vol. 11, pp. 394- 408 ,(2014) , 10.1109/TASE.2013.2262940
Hisham A. Kholidy, Abdelkarim Erradi, Sherif Abdelwahed, Abdulrahman Azab, A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems ieee international conference on dependable, autonomic and secure computing. pp. 14- 19 ,(2014) , 10.1109/DASC.2014.12