The Application of Baum-Welch Algorithm in Multistep Attack
The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/374260 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832548858974961664 |
---|---|
author | Yanxue Zhang Dongmei Zhao Jinxing Liu |
author_facet | Yanxue Zhang Dongmei Zhao Jinxing Liu |
author_sort | Yanxue Zhang |
collection | DOAJ |
description | The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction. |
format | Article |
id | doaj-art-f6c56eb0609640f09130fba5f200c90a |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-f6c56eb0609640f09130fba5f200c90a2025-02-03T06:12:53ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/374260374260The Application of Baum-Welch Algorithm in Multistep AttackYanxue Zhang0Dongmei Zhao1Jinxing Liu2College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050000, ChinaCollege of Information Technology, Hebei Normal University, Shijiazhuang 050000, ChinaThe First Aeronautics College of PLAAF, Xinyang 464000, ChinaThe biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction.http://dx.doi.org/10.1155/2014/374260 |
spellingShingle | Yanxue Zhang Dongmei Zhao Jinxing Liu The Application of Baum-Welch Algorithm in Multistep Attack The Scientific World Journal |
title | The Application of Baum-Welch Algorithm in Multistep Attack |
title_full | The Application of Baum-Welch Algorithm in Multistep Attack |
title_fullStr | The Application of Baum-Welch Algorithm in Multistep Attack |
title_full_unstemmed | The Application of Baum-Welch Algorithm in Multistep Attack |
title_short | The Application of Baum-Welch Algorithm in Multistep Attack |
title_sort | application of baum welch algorithm in multistep attack |
url | http://dx.doi.org/10.1155/2014/374260 |
work_keys_str_mv | AT yanxuezhang theapplicationofbaumwelchalgorithminmultistepattack AT dongmeizhao theapplicationofbaumwelchalgorithminmultistepattack AT jinxingliu theapplicationofbaumwelchalgorithminmultistepattack AT yanxuezhang applicationofbaumwelchalgorithminmultistepattack AT dongmeizhao applicationofbaumwelchalgorithminmultistepattack AT jinxingliu applicationofbaumwelchalgorithminmultistepattack |