Skip to main content

Network Security Situation Assessment Based on Hidden Semi-Markov Model

  • Conference paper
Advanced Intelligent Computing (ICIC 2011)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6838))

Included in the following conference series:

Abstract

This paper takes use of the hidden semi-Markov model to evaluate network security situation. HsMM modifies HMM model on the presumption that certain system status dwell time abides with exponential distribution, which is more suitable to describe the actual situation of network system operation.We propose the HsMM system status prediction algorithm under partial observation conditions, and applies it into network security situation assessment. The ex-periment result shows that HsMM could model system status dwell time, so it is very propitious to make network system security assessment under complicated and changeable attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bass, T., Roger, R.: Defense-in-Depth Revisited:Qualitative Risk Analysis Methdology for Complex Network-Centric Operations. In: Proceedings of IEEE Military Communications Conference, vol. 1, pp. 64–70 (2001)

    Google Scholar 

  2. Huang, X.D.: Phoneme Classification Using Semicontinuous Hidden Markov Models. IEEE Trans. SP 40(5), 1062–1067 (1992)

    Article  Google Scholar 

  3. Yu, S.Z.: Hidden semi-Markov models. Artificial Intelligence 174, 215–243 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  4. Yao, T.R.: Digital Signal Processing, pp. 316–346. Huazhong University of Science and Technology Press, Wuhan (1991)

    Google Scholar 

  5. Johnson, M.T.: Capacity and Complexity of HMM Duration Modeling Techniques. IEEE Signal Processing Letters 12(5), 407–410 (2005)

    Article  Google Scholar 

  6. Project H.Scan 17 (2002), http://www.honeynet.org/scans/scan17

Download references

Author information

Authors and Affiliations

Authors

Editor information

De-Shuang Huang Yong Gan Vitoantonio Bevilacqua Juan Carlos Figueroa

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, B., Chen, Z., Yan, X., Wang, S., Fan, Q. (2011). Network Security Situation Assessment Based on Hidden Semi-Markov Model. In: Huang, DS., Gan, Y., Bevilacqua, V., Figueroa, J.C. (eds) Advanced Intelligent Computing. ICIC 2011. Lecture Notes in Computer Science, vol 6838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24728-6_69

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-24728-6_69

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-24727-9

  • Online ISBN: 978-3-642-24728-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics