Cargando…
The Application of Baum-Welch Algorithm in Multistep Attack
The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058473/ https://www.ncbi.nlm.nih.gov/pubmed/24991642 http://dx.doi.org/10.1155/2014/374260 |
_version_ | 1782321124223221760 |
---|---|
author | Zhang, Yanxue Zhao, Dongmei Liu, Jinxing |
author_facet | Zhang, Yanxue Zhao, Dongmei Liu, Jinxing |
author_sort | Zhang, Yanxue |
collection | PubMed |
description | The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. |
format | Online Article Text |
id | pubmed-4058473 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-40584732014-07-02 The Application of Baum-Welch Algorithm in Multistep Attack Zhang, Yanxue Zhao, Dongmei Liu, Jinxing ScientificWorldJournal Research Article The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. Hindawi Publishing Corporation 2014 2014-05-28 /pmc/articles/PMC4058473/ /pubmed/24991642 http://dx.doi.org/10.1155/2014/374260 Text en Copyright © 2014 Yanxue Zhang et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Zhang, Yanxue Zhao, Dongmei Liu, Jinxing The Application of Baum-Welch Algorithm in Multistep Attack |
title | The Application of Baum-Welch Algorithm in Multistep Attack |
title_full | The Application of Baum-Welch Algorithm in Multistep Attack |
title_fullStr | The Application of Baum-Welch Algorithm in Multistep Attack |
title_full_unstemmed | The Application of Baum-Welch Algorithm in Multistep Attack |
title_short | The Application of Baum-Welch Algorithm in Multistep Attack |
title_sort | application of baum-welch algorithm in multistep attack |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4058473/ https://www.ncbi.nlm.nih.gov/pubmed/24991642 http://dx.doi.org/10.1155/2014/374260 |
work_keys_str_mv | AT zhangyanxue theapplicationofbaumwelchalgorithminmultistepattack AT zhaodongmei theapplicationofbaumwelchalgorithminmultistepattack AT liujinxing theapplicationofbaumwelchalgorithminmultistepattack AT zhangyanxue applicationofbaumwelchalgorithminmultistepattack AT zhaodongmei applicationofbaumwelchalgorithminmultistepattack AT liujinxing applicationofbaumwelchalgorithminmultistepattack |