Cargando…

The Application of Baum-Welch Algorithm in Multistep Attack

The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov...

Descripción completa

Detalles Bibliográficos
Autores principales: Zhang, Yanxue, Zhao, Dongmei, Liu, Jinxing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Hindawi Publishing Corporation 2014
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058473/
https://www.ncbi.nlm.nih.gov/pubmed/24991642
http://dx.doi.org/10.1155/2014/374260
_version_ 1782321124223221760
author Zhang, Yanxue
Zhao, Dongmei
Liu, Jinxing
author_facet Zhang, Yanxue
Zhao, Dongmei
Liu, Jinxing
author_sort Zhang, Yanxue
collection PubMed
description The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction.
format Online
Article
Text
id pubmed-4058473
institution National Center for Biotechnology Information
language English
publishDate 2014
publisher Hindawi Publishing Corporation
record_format MEDLINE/PubMed
spelling pubmed-40584732014-07-02 The Application of Baum-Welch Algorithm in Multistep Attack Zhang, Yanxue Zhao, Dongmei Liu, Jinxing ScientificWorldJournal Research Article The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. Hindawi Publishing Corporation 2014 2014-05-28 /pmc/articles/PMC4058473/ /pubmed/24991642 http://dx.doi.org/10.1155/2014/374260 Text en Copyright © 2014 Yanxue Zhang et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Zhang, Yanxue
Zhao, Dongmei
Liu, Jinxing
The Application of Baum-Welch Algorithm in Multistep Attack
title The Application of Baum-Welch Algorithm in Multistep Attack
title_full The Application of Baum-Welch Algorithm in Multistep Attack
title_fullStr The Application of Baum-Welch Algorithm in Multistep Attack
title_full_unstemmed The Application of Baum-Welch Algorithm in Multistep Attack
title_short The Application of Baum-Welch Algorithm in Multistep Attack
title_sort application of baum-welch algorithm in multistep attack
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058473/
https://www.ncbi.nlm.nih.gov/pubmed/24991642
http://dx.doi.org/10.1155/2014/374260
work_keys_str_mv AT zhangyanxue theapplicationofbaumwelchalgorithminmultistepattack
AT zhaodongmei theapplicationofbaumwelchalgorithminmultistepattack
AT liujinxing theapplicationofbaumwelchalgorithminmultistepattack
AT zhangyanxue applicationofbaumwelchalgorithminmultistepattack
AT zhaodongmei applicationofbaumwelchalgorithminmultistepattack
AT liujinxing applicationofbaumwelchalgorithminmultistepattack