Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks.
Dirk OurstonSara MatznerWilliam StumpBryan HopkinsPublished in: HICSS (2003)
Keyphrases
- hidden markov models
- multistage
- network attacks
- intrusion detection
- network intrusion detection
- single stage
- dynamic programming
- speech recognition
- network security
- conditional random fields
- sequential data
- markov model
- markov models
- random effects
- baum welch
- sequence classification
- hidden state
- intrusion detection system
- dos attacks
- visual speech recognition
- image segmentation
- hidden semi markov models
- hidden states
- viterbi algorithm
- optimal policy
- anomaly detection
- data analysis