Hidden Markov Models (HMMs) have applications in several areas of computer security. One drawback of HMMs is the selection of appropriate model parameters, which is often ad hoc or requires domain-specific knowledge. While algorithms exist to find local optima for some parameters, the number of states must always be specified and directly impacts the accuracy and generality of the model. In addition, domain knowledge is not always available or may be based on assumptions that prove incorrect or sub-optimal. We apply the e-machine - a special type of HMM - to the task of constructing network protocol models solely from network traffic. Unlike previous approaches, e-machine reconstruction infers the minimal HMM architecture directly from data and is well suited to applications such as anomaly detection. We draw distinctions between our approach and previous research, and discuss the benefits and challenges of e-machines for protocol model inference.© Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010.
CITATION STYLE
Whalen, S., Bishop, M., & Crutchfield, J. P. (2010). Hidden Markov models for automated protocol learning. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 50 LNICST, pp. 415–428). https://doi.org/10.1007/978-3-642-16161-2_24
Mendeley helps you to discover research relevant for your work.