The Application of Baum-Welch Algorithm in Multistep Attack

The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov...

Full description

Saved in:
Bibliographic Details
Main Authors: Yanxue Zhang, Dongmei Zhao, Jinxing Liu
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:The Scientific World Journal
Online Access:http://dx.doi.org/10.1155/2014/374260
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832548858974961664
author Yanxue Zhang
Dongmei Zhao
Jinxing Liu
author_facet Yanxue Zhang
Dongmei Zhao
Jinxing Liu
author_sort Yanxue Zhang
collection DOAJ
description The biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction.
format Article
id doaj-art-f6c56eb0609640f09130fba5f200c90a
institution Kabale University
issn 2356-6140
1537-744X
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series The Scientific World Journal
spelling doaj-art-f6c56eb0609640f09130fba5f200c90a2025-02-03T06:12:53ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/374260374260The Application of Baum-Welch Algorithm in Multistep AttackYanxue Zhang0Dongmei Zhao1Jinxing Liu2College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050000, ChinaCollege of Information Technology, Hebei Normal University, Shijiazhuang 050000, ChinaThe First Aeronautics College of PLAAF, Xinyang 464000, ChinaThe biggest difficulty of hidden Markov model applied to multistep attack is the determination of observations. Now the research of the determination of observations is still lacking, and it shows a certain degree of subjectivity. In this regard, we integrate the attack intentions and hidden Markov model (HMM) and support a method to forecasting multistep attack based on hidden Markov model. Firstly, we train the existing hidden Markov model(s) by the Baum-Welch algorithm of HMM. Then we recognize the alert belonging to attack scenarios with the Forward algorithm of HMM. Finally, we forecast the next possible attack sequence with the Viterbi algorithm of HMM. The results of simulation experiments show that the hidden Markov models which have been trained are better than the untrained in recognition and prediction.http://dx.doi.org/10.1155/2014/374260
spellingShingle Yanxue Zhang
Dongmei Zhao
Jinxing Liu
The Application of Baum-Welch Algorithm in Multistep Attack
The Scientific World Journal
title The Application of Baum-Welch Algorithm in Multistep Attack
title_full The Application of Baum-Welch Algorithm in Multistep Attack
title_fullStr The Application of Baum-Welch Algorithm in Multistep Attack
title_full_unstemmed The Application of Baum-Welch Algorithm in Multistep Attack
title_short The Application of Baum-Welch Algorithm in Multistep Attack
title_sort application of baum welch algorithm in multistep attack
url http://dx.doi.org/10.1155/2014/374260
work_keys_str_mv AT yanxuezhang theapplicationofbaumwelchalgorithminmultistepattack
AT dongmeizhao theapplicationofbaumwelchalgorithminmultistepattack
AT jinxingliu theapplicationofbaumwelchalgorithminmultistepattack
AT yanxuezhang applicationofbaumwelchalgorithminmultistepattack
AT dongmeizhao applicationofbaumwelchalgorithminmultistepattack
AT jinxingliu applicationofbaumwelchalgorithminmultistepattack