Policy Misuse Detection in Communication Networks with Hidden Markov Models

被引:2
作者
Tosun, Umut [1 ]
机构
[1] Baskent Univ, Dept Comp Engn, Fac Engn, TR-06530 Ankara, Turkey
来源
5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014) | 2014年 / 32卷
关键词
Policy Misuse; Hidden Markov Models; PROBABILISTIC FUNCTIONS;
D O I
10.1016/j.procs.2014.05.516
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations while preventing misuses and intrusions in data communication through internet or any other network. Adherence to network usage policies is crucial since a system or network administrator needs to be informed whether the information is compromised, if the resources are appropriately used or if an attacker exploits a comprised service. Server flow authentication via protocol detection analyzes penetrations to a communication network. Generally, port numbers in the packet headers are used to detect the protocols. However, it is easy to re-map port numbers via proxies and changing the port number via compromised host services. Using port numbers may be misleading for a system administrator to understand the natural flow of communications through network. It is also difficult to understand the user behavior when the traffic is encrypted since there is only packet level information to be considered. In this paper, we present a novel approach via Hidden Markov Models to detect user behavior in network traffic. We perform the detection process on timing measures of packets. The results are promising and we obtained classification accuracies between %70 and %100. (C) 2014 Published by Elsevier B.V.
引用
收藏
页码:947 / 952
页数:6
相关论文
共 50 条
  • [31] Asymptotic Bayesian Theory of Quickest Change Detection for Hidden Markov Models
    Fuh, Cheng-Der
    Tartakovsky, Alexander G.
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (01) : 511 - 529
  • [32] Detection of steering events using hidden Markov models with multivariate observations
    Maghsood R.
    Johannesson P.
    Wallin J.
    Maghsood, Roza (rozam@chalmers.se), 1600, Inderscience Publishers, 29, route de Pre-Bois, Case Postale 856, CH-1215 Geneva 15, CH-1215, Switzerland (11): : 313 - 329
  • [33] Wavelet-domain hidden Markov models for signal detection and classification
    Crouse, MS
    Nowak, RD
    Mhirsi, K
    Baraniuk, RG
    ADVANCED SIGNAL PROCESSING: ALGORITHMS, ARCHITECTURES, AND IMPLEMENTATIONS VII, 1997, 3162 : 36 - 47
  • [34] Multiple Instance Learning for Hidden Markov Models: Application to Landmine Detection
    Bolton, Jeremy
    Yuksel, Seniha Esen
    Gader, Paul
    DETECTION AND SENSING OF MINES, EXPLOSIVE OBJECTS, AND OBSCURED TARGETS XVIII, 2013, 8709
  • [35] Fault detection and diagnosis in a food pasteurization process with hidden Markov models
    Tokatli, F
    Cinar, A
    CANADIAN JOURNAL OF CHEMICAL ENGINEERING, 2004, 82 (06) : 1252 - 1262
  • [36] Detection of unusual optical flow patterns by multilevel hidden Markov models
    Utasi, Akos
    Czuni, Laszlo
    OPTICAL ENGINEERING, 2010, 49 (01)
  • [37] Detection of selective cationic amphipatic antibacterial peptides by Hidden Markov models
    Polanco, Carlos
    Samaniego, Jose L.
    ACTA BIOCHIMICA POLONICA, 2009, 56 (01) : 167 - 176
  • [38] Data-Driven Quickest Change Detection in (Hidden) Markov Models
    Zhang, Qi
    Sun, Zhongchang
    Herrera, Luis C.
    Zou, Shaofeng
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2024, 72 : 5567 - 5580
  • [39] Failure detection and diagnosis of gyro motors using hidden Markov models
    Dong, Lei
    Li, De-Cai
    Wei, Jun-Xin
    Li, Wei-Min
    Pan, Long-Fei
    Sun, Xiao-Jin
    Chen, Yun-Fei
    Zhongguo Guanxing Jishu Xuebao/Journal of Chinese Inertial Technology, 2014, 22 (06): : 829 - 833
  • [40] Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection
    Cha K.-H.
    Kang D.-K.
    Journal of Computer Virology and Hacking Techniques, 2017, 13 (3) : 233 - 238