Skip to main content

Multi-stage Attack Detection Algorithm Based on Hidden Markov Model

  • Conference paper
Web Information Systems and Mining (WISM 2012)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 7529))

Included in the following conference series:

Abstract

With the growing amount and kinds of network intrusion, multi-stage attack is becoming the one of the main methos of the network security threaten. The hidden Markov model is a kind of probabilistic model, which is widely used in speech recognition, text and image processing. In this paper, a Multi-stage Attack Detection Algorithm Based on Hidden Markov Model is proposed.And inorder to improve the performance of this algorithm,aother algorithm aims at false positive filter is also put forward. Experiments show that the algorithm has good perfomance in multi-stage attack detection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Symantec Global Internet Security Threat Report trends, http://eval.symantec.com/mktginfo/enterprise/white_papers/bwhitepaper_internet_security_threat_report_xiv_04-2009.en-us.pdf

  2. Symantec Internet Security Threat Reaport, http://www.symantec.com/zh/cn/theme.jsp?themeid=istr

  3. Li, W.: Study on Method of network Multi-stage Attack Plan Recognition, Wu Han (2007)

    Google Scholar 

  4. Lindqvist, U., Porras, P.A.: Detecting computer and network misuse throughproduction-based exstemsy system toolset (P-BEST). In: Proceedings of the IEEE Comuter Society Symposium on Research in Security and Privacy, pp. 146–161. IEEE Press, Washington, D.C. (1999)

    Google Scholar 

  5. Liang, Y., Zhou, J., Yan, P.: Network Intrusion Detection System Based on CPN and Mobile Agent. J. Computer Engineering 16, 106–108 (2003)

    Google Scholar 

  6. Sun, Y., Zhong, Q., Su, J.: Research on Intention Recognition Based on HMM. J. Computer Engineering & Science 29(8), 19–22 (2007)

    Google Scholar 

  7. Balthrop, J., Esponda, F., Forrest, S., et al.: Coverage and Generalization in an Artificial Immune System. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 3–10. Morgan Kaufmann, New York (2002)

    Google Scholar 

  8. Valdes, A., Skinner, K.: Adaptive, Model-Based Monitoring for Cyber Attack Detection. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 80–92. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  9. Pietraszek, T., Tanner, A.: Data mining and machine learning-Towards reducing false positives in intrusion detection. Information Security Technical Report 10, 169–183 (2005)

    Article  Google Scholar 

  10. Templeton, S.J., Levitt, K.: A requires/provides model for computer attacks. In: Proceedings of the New Security Paradigms Workshop 2000, Cork Ireland, pp. 31–38 (2000)

    Google Scholar 

  11. Zhong, A.M., Jia, C.F.: Study on the application of hidden Markov models to computer intrusion detection. In: Proceedings of the 5th World Congress on Intelligent Control and Automation, pp. 4352–4357 (2004)

    Google Scholar 

  12. Chen, X., Wen, Z.: The Research on Network Intrusion Detection Method Based on RBF-HMM. J. Network Security 1, 9–11 (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Luktarhan, N., Jia, X., Hu, L., Xie, N. (2012). Multi-stage Attack Detection Algorithm Based on Hidden Markov Model. In: Wang, F.L., Lei, J., Gong, Z., Luo, X. (eds) Web Information Systems and Mining. WISM 2012. Lecture Notes in Computer Science, vol 7529. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-33469-6_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-33469-6_37

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-33468-9

  • Online ISBN: 978-3-642-33469-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics