A systematic review on intrusion detection based on the Hidden Markov Model

作者: Ali Ahmadian Ramaki , Abbas Rasoolzadegan , Abbas Javan Jafari

DOI: 10.1002/SAM.11377

关键词:

摘要: … their user data to the MPC and expect homogenous operations … the previous HMM-based MPC models by creating a model in … of attacks, such as the complexity of the steps of the attack …

参考文章(90)
Syed Shariyar Murtaza, Wael Khreich, Abdelwahab Hamou-Lhadj, Stephane Gagnon, A trace abstraction approach for host-based anomaly detection computational intelligence and security. pp. 1- 8 ,(2015) , 10.1109/CISDA.2015.7208644
Weijin Jiang, Yusheng Xu, Yuhui Xu, A Novel Intrusions Detection Method Based on HMM Embedded Neural Network Lecture Notes in Computer Science. pp. 139- 148 ,(2005) , 10.1007/11539087_16
André Årnes, Fredrik Valeur, Giovanni Vigna, Richard A. Kemmerer, Using Hidden Markov Models to Evaluate the Risks of Intrusions Lecture Notes in Computer Science. pp. 145- 164 ,(2006) , 10.1007/11856214_8
Nurbol Luktarhan, Xue Jia, Liang Hu, Nannan Xie, Multi-stage attack detection algorithm based on hidden markov model web information systems modeling. pp. 275- 282 ,(2012) , 10.1007/978-3-642-33469-6_37
Chinmayee Annachhatre, Thomas H. Austin, Mark Stamp, Hidden Markov models for malware classification Journal of Computer Virology and Hacking Techniques. ,vol. 11, pp. 59- 73 ,(2015) , 10.1007/S11416-014-0215-X
Panhong Wang, Liang Shi, Beizhan Wang, Yuanqin Wu, Yangbin Liu, None, Survey on HMM based anomaly intrusion detection using system calls international conference on computer science and education. pp. 102- 105 ,(2010) , 10.1109/ICCSE.2010.5593839
Ali Ahmadian Ramaki, Morteza Amini, Reza Ebrahimi Atani, RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection Computers & Security. ,vol. 49, pp. 206- 219 ,(2015) , 10.1016/J.COSE.2014.10.006
Sung-Bae Cho, Hyuk-Jang Park, Efficient anomaly detection by modeling privilege flows using hidden Markov model Computers & Security. ,vol. 22, pp. 45- 55 ,(2003) , 10.1016/S0167-4048(03)00112-3
Hervé Debar, Marc Dacier, Andreas Wespi, Towards a taxonomy of intrusion-detection systems Computer Networks. ,vol. 31, pp. 805- 822 ,(1999) , 10.1016/S1389-1286(98)00017-6
Shi Zhicai, Xia Yongxiang, A novel hidden Markov model for detecting complicate network attacks wireless communications, networking and information security. pp. 312- 315 ,(2010) , 10.1109/WCINS.2010.5541790