Policy Misuse Detection in Communication Networks with Hidden Markov Models

被引:2
|
作者
Tosun, Umut [1 ]
机构
[1] Baskent Univ, Dept Comp Engn, Fac Engn, TR-06530 Ankara, Turkey
来源
5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014) | 2014年 / 32卷
关键词
Policy Misuse; Hidden Markov Models; PROBABILISTIC FUNCTIONS;
D O I
10.1016/j.procs.2014.05.516
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations while preventing misuses and intrusions in data communication through internet or any other network. Adherence to network usage policies is crucial since a system or network administrator needs to be informed whether the information is compromised, if the resources are appropriately used or if an attacker exploits a comprised service. Server flow authentication via protocol detection analyzes penetrations to a communication network. Generally, port numbers in the packet headers are used to detect the protocols. However, it is easy to re-map port numbers via proxies and changing the port number via compromised host services. Using port numbers may be misleading for a system administrator to understand the natural flow of communications through network. It is also difficult to understand the user behavior when the traffic is encrypted since there is only packet level information to be considered. In this paper, we present a novel approach via Hidden Markov Models to detect user behavior in network traffic. We perform the detection process on timing measures of packets. The results are promising and we obtained classification accuracies between %70 and %100. (C) 2014 Published by Elsevier B.V.
引用
收藏
页码:947 / 952
页数:6
相关论文
共 50 条
  • [1] A review of Hidden Markov models and Recurrent Neural Networks for event detection and localization in biomedical signals
    Khalifa, Yassin
    Mandic, Danilo
    Sejdic, Ervin
    INFORMATION FUSION, 2021, 69 : 52 - 72
  • [2] An introduction to hidden Markov models and Bayesian networks
    Ghahramani, Z
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 2001, 15 (01) : 9 - 42
  • [3] HMMPayl: An intrusion detection system based on Hidden Markov Models
    Ariu, Davide
    Tronci, Roberto
    Giacinto, Giorgio
    COMPUTERS & SECURITY, 2011, 30 (04) : 221 - 241
  • [4] Hidden Markov Models for Software Piracy Detection
    Kazi, Shabana
    Stamp, Mark
    INFORMATION SECURITY JOURNAL, 2013, 22 (03): : 140 - 149
  • [5] On the definitions of hidden Markov models
    Saize, Stefane
    Yang, Xiangfeng
    APPLIED MATHEMATICAL MODELLING, 2024, 125 : 617 - 629
  • [6] Combining Hidden Markov Models for Improved Anomaly Detection
    Khreich, Wael
    Granger, Eric
    Sabourin, Robert
    Miri, Ali
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 965 - +
  • [7] LANDMINE DETECTION WITH MULTIPLE INSTANCE HIDDEN MARKOV MODELS
    Yuksel, Seniha Esen
    Bolton, Jeremy
    Gader, Paul D.
    2012 IEEE INTERNATIONAL WORKSHOP ON MACHINE LEARNING FOR SIGNAL PROCESSING (MLSP), 2012,
  • [8] Helicopter detection and classification using hidden Markov models
    Kuklinski, WS
    O'Neil, SD
    Tromp, LD
    SIGNAL PROCESSING, SENSOR FUSION, AND TARGET RECOGNITION VIII, 1999, 3720 : 130 - 139
  • [9] Detection of myocardial ischemia using hidden Markov models
    Bardonova, J
    Provaznik, I
    Novakova, M
    Vesela, R
    PROCEEDINGS OF THE 25TH ANNUAL INTERNATIONAL CONFERENCE OF THE IEEE ENGINEERING IN MEDICINE AND BIOLOGY SOCIETY, VOLS 1-4: A NEW BEGINNING FOR HUMAN HEALTH, 2003, 25 : 2869 - 2872
  • [10] Ensemble hidden Markov models with application to landmine detection
    Hamdi, Anis
    Frigui, Hichem
    EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2015, : 1 - 15