Hidden semi-Markov model for anomaly detection
نویسندگان
چکیده
In this paper, hidden semi-Markov model (HSMM) is introduced into intrusion detection. Hidden Markov model (HMM) has been applied in intrusion detection systems several years, but it has a major weakness: the inherent duration probability density of a state in HMM is exponential, which may be inappropriate for the modeling of audit data of computer systems. We can handle this problem well by developing an HSMM for perfect normal processes of computer systems. Based on this HSMM, an algorithm of anomaly detection is presented in this paper, which computes the distance between the processes monitored by intrusion detection system and the perfect normal processes. In this algorithm, we use the average information entropy (AIE) of fixed-length observed sequence as the anomaly detection metric based on maximum entropy principle (MEP). To improve accuracy, the segmental K-means algorithm is applied as training algorithm for the HSMM. By comparing the accurate rate with the experimental results of previous research, it shows that our method can perform a more accurate detection. 2008 Elsevier Inc. All rights reserved.
منابع مشابه
An Anomaly Detection System Based on a Hidden Semi-Markov Model
* This work was supported by National Natural Science Foundation of China under grant no. 90304011, Guangdong Natural Science Foundation under grant no. 04009747 and Higher Education Foundation for Ph.D Program under grant no. 20040558043. Abstract-This paper presents a novel anomaly detection method that is to be used in detecting distributed denial of service (DDoS) attacks on a Web server. T...
متن کاملIntrusion Detection Using Evolutionary Hidden Markov Model
Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training, ...
متن کاملAnomaly Detection in Wireless Mobile Ad hoc Networks with Multi-Layer Observation Sequences
Mobile ad hoc Networks (Manet) are very vulnerable to malicious attacks due to the nature of mobile computing environment such as absence of fixed infrastructures, wireless communication channels, limited power and bandwidth, dynamically changing and distributed network topology, etc. The general existing Intrusion Detection Systems (IDS) have provided little evidence that they are applicable t...
متن کاملTelemetry Monitoring by Dimensionality Reduction and Learning Hidden Markov Model
This paper proposes a data-driven health monitoring / anomaly detection method for spacecraft systems. Especially, we focus on some common properties spacecraft telemetry data has, such as highdimensionality, multi-modality and periodicity. The proposed method first monitors the static relationships among a number of variables contained in the telemetry by hybrid of clustering and dimensionalit...
متن کاملAn anomaly detection on the application-layer-based QoS in the cloud storage system
Attacks based on the application layer of the cloud storage system have been dramatically increasing nowadays. However, the present detection studies of attacks are mainly focused on the network and transmission layer instead of the application layer. In this paper, we proposed an anomaly attack detection method based on the hidden semi-Markov model (HsMM) to secure the cloud storage system fro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Applied Mathematics and Computation
دوره 205 شماره
صفحات -
تاریخ انتشار 2008