Abstract
This paper takes use of the hidden semi-Markov model to evaluate network security situation. HsMM modifies HMM model on the presumption that certain system status dwell time abides with exponential distribution, which is more suitable to describe the actual situation of network system operation.We propose the HsMM system status prediction algorithm under partial observation conditions, and applies it into network security situation assessment. The ex-periment result shows that HsMM could model system status dwell time, so it is very propitious to make network system security assessment under complicated and changeable attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bass, T., Roger, R.: Defense-in-Depth Revisited:Qualitative Risk Analysis Methdology for Complex Network-Centric Operations. In: Proceedings of IEEE Military Communications Conference, vol. 1, pp. 64–70 (2001)
Huang, X.D.: Phoneme Classification Using Semicontinuous Hidden Markov Models. IEEE Trans. SP 40(5), 1062–1067 (1992)
Yu, S.Z.: Hidden semi-Markov models. Artificial Intelligence 174, 215–243 (2010)
Yao, T.R.: Digital Signal Processing, pp. 316–346. Huazhong University of Science and Technology Press, Wuhan (1991)
Johnson, M.T.: Capacity and Complexity of HMM Duration Modeling Techniques. IEEE Signal Processing Letters 12(5), 407–410 (2005)
Project H.Scan 17 (2002), http://www.honeynet.org/scans/scan17
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zhang, B., Chen, Z., Yan, X., Wang, S., Fan, Q. (2011). Network Security Situation Assessment Based on Hidden Semi-Markov Model. In: Huang, DS., Gan, Y., Bevilacqua, V., Figueroa, J.C. (eds) Advanced Intelligent Computing. ICIC 2011. Lecture Notes in Computer Science, vol 6838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-24728-6_69
Download citation
DOI: https://doi.org/10.1007/978-3-642-24728-6_69
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-24727-9
Online ISBN: 978-3-642-24728-6
eBook Packages: Computer ScienceComputer Science (R0)