Architectures for Detecting Real-time Multiple Multi-stage Network Attacks Using Hidden Markov Model.
Tawfeeq A. ShawlyAli A. ElgharianiJason KobesArif GhafoorPublished in: CoRR (2018)
Keyphrases
- hidden markov models
- multistage
- dynamic programming
- single stage
- gesture recognition
- handwritten word recognition
- markov models
- speech recognition
- markov model
- hidden state
- lot sizing
- sequential data
- conditional random fields
- intrusion detection
- network attacks
- optimal policy
- viterbi algorithm
- computer systems
- network security
- network intrusion detection
- unsupervised learning
- multi stream
- data processing
- continuous hidden markov models