Policy Misuse Detection in Communication Networks with Hidden Markov Models

被引:2
作者
Tosun, Umut [1 ]
机构
[1] Baskent Univ, Dept Comp Engn, Fac Engn, TR-06530 Ankara, Turkey
来源
5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014) | 2014年 / 32卷
关键词
Policy Misuse; Hidden Markov Models; PROBABILISTIC FUNCTIONS;
D O I
10.1016/j.procs.2014.05.516
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
With the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations while preventing misuses and intrusions in data communication through internet or any other network. Adherence to network usage policies is crucial since a system or network administrator needs to be informed whether the information is compromised, if the resources are appropriately used or if an attacker exploits a comprised service. Server flow authentication via protocol detection analyzes penetrations to a communication network. Generally, port numbers in the packet headers are used to detect the protocols. However, it is easy to re-map port numbers via proxies and changing the port number via compromised host services. Using port numbers may be misleading for a system administrator to understand the natural flow of communications through network. It is also difficult to understand the user behavior when the traffic is encrypted since there is only packet level information to be considered. In this paper, we present a novel approach via Hidden Markov Models to detect user behavior in network traffic. We perform the detection process on timing measures of packets. The results are promising and we obtained classification accuracies between %70 and %100. (C) 2014 Published by Elsevier B.V.
引用
收藏
页码:947 / 952
页数:6
相关论文
共 50 条
  • [41] PROPER INITIALIZATION OF HIDDEN MARKOV MODELS FOR INDUSTRIAL APPLICATIONS
    Liu, Tingting
    Lemeire, Jan
    Yang, Lixin
    2014 IEEE CHINA SUMMIT & INTERNATIONAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (CHINASIP), 2014, : 490 - 494
  • [42] Learning hidden Markov models from aggregate observations
    Singh, Rahul
    Zhang, Qinsheng
    Chen, Yongxin
    AUTOMATICA, 2022, 137
  • [43] On hidden Markov models and cyclic strings for shape recognition
    Palazon-Gonzalez, Vicente
    Marzal, Andres
    Vilar, Juan M.
    PATTERN RECOGNITION, 2014, 47 (07) : 2490 - 2504
  • [44] Dynamic classification of ballistic missiles using neural networks and hidden Markov models
    Singh, Upendra Kumar
    Padmanabhan, Vineet
    Agarwal, Arun
    APPLIED SOFT COMPUTING, 2014, 19 : 280 - 289
  • [45] Evolutionary Training of Hybrid Systems of Recurrent Neural Networks and Hidden Markov Models
    Chandra, Rohitash
    Omlin, Christian W.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 15, 2006, 15 : 58 - +
  • [46] Hidden Markov models as recurrent neural networks: An application to Alzheimer's disease
    Baucum, Matt
    Khojandi, Anahita
    Papamarkou, Theodore
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (IEEE BIBE 2021), 2021,
  • [47] A novel hybrid system with neural networks and hidden Markov models in fault diagnosis
    Miao, Qiang
    Huang, Hong-Zhong
    Fan, Xianfeng
    MICAI 2006: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4293 : 513 - +
  • [48] Distributed state estimation for hidden Markov models by sensor networks with dynamic quantization
    Huang, M
    Dey, S
    PROCEEDINGS OF THE 2004 INTELLIGENT SENSORS, SENSOR NETWORKS & INFORMATION PROCESSING CONFERENCE, 2004, : 355 - 360
  • [49] Creditworthiness dynamics and Hidden Markov Models
    Quirini, L.
    Vannucci, L.
    JOURNAL OF THE OPERATIONAL RESEARCH SOCIETY, 2014, 65 (03) : 323 - 330
  • [50] Hidden Markov models in text recognition
    Anigbogu, JC
    Belaid, A
    INTERNATIONAL JOURNAL OF PATTERN RECOGNITION AND ARTIFICIAL INTELLIGENCE, 1995, 9 (06) : 925 - 958