Hidden semi-Markov model for anomaly detection

نویسندگان

  • Xiaobin Tan
  • Hongsheng Xi
چکیده

In this paper, hidden semi-Markov model (HSMM) is introduced into intrusion detection. Hidden Markov model (HMM) has been applied in intrusion detection systems several years, but it has a major weakness: the inherent duration probability density of a state in HMM is exponential, which may be inappropriate for the modeling of audit data of computer systems. We can handle this problem well by developing an HSMM for perfect normal processes of computer systems. Based on this HSMM, an algorithm of anomaly detection is presented in this paper, which computes the distance between the processes monitored by intrusion detection system and the perfect normal processes. In this algorithm, we use the average information entropy (AIE) of fixed-length observed sequence as the anomaly detection metric based on maximum entropy principle (MEP). To improve accuracy, the segmental K-means algorithm is applied as training algorithm for the HSMM. By comparing the accurate rate with the experimental results of previous research, it shows that our method can perform a more accurate detection. 2008 Elsevier Inc. All rights reserved.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Anomaly Detection System Based on a Hidden Semi-Markov Model

* This work was supported by National Natural Science Foundation of China under grant no. 90304011, Guangdong Natural Science Foundation under grant no. 04009747 and Higher Education Foundation for Ph.D Program under grant no. 20040558043. Abstract-This paper presents a novel anomaly detection method that is to be used in detecting distributed denial of service (DDoS) attacks on a Web server. T...

متن کامل

Intrusion Detection Using Evolutionary Hidden Markov Model

Intrusion detection systems are responsible for diagnosing and detecting any unauthorized use of the system, exploitation or destruction, which is able to prevent cyber-attacks using the network package analysis. one of the major challenges in the use of these tools is lack of educational patterns of attacks on the part of the engine analysis; engine failure that caused the complete training,  ...

متن کامل

Anomaly Detection in Wireless Mobile Ad hoc Networks with Multi-Layer Observation Sequences

Mobile ad hoc Networks (Manet) are very vulnerable to malicious attacks due to the nature of mobile computing environment such as absence of fixed infrastructures, wireless communication channels, limited power and bandwidth, dynamically changing and distributed network topology, etc. The general existing Intrusion Detection Systems (IDS) have provided little evidence that they are applicable t...

متن کامل

Telemetry Monitoring by Dimensionality Reduction and Learning Hidden Markov Model

This paper proposes a data-driven health monitoring / anomaly detection method for spacecraft systems. Especially, we focus on some common properties spacecraft telemetry data has, such as highdimensionality, multi-modality and periodicity. The proposed method first monitors the static relationships among a number of variables contained in the telemetry by hybrid of clustering and dimensionalit...

متن کامل

An anomaly detection on the application-layer-based QoS in the cloud storage system

Attacks based on the application layer of the cloud storage system have been dramatically increasing nowadays. However, the present detection studies of attacks are mainly focused on the network and transmission layer instead of the application layer. In this paper, we proposed an anomaly attack detection method based on the hidden semi-Markov model (HsMM) to secure the cloud storage system fro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Applied Mathematics and Computation

دوره 205  شماره 

صفحات  -

تاریخ انتشار 2008