Hidden Markov models for automated protocol learning

15Citations
Citations of this article
33Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Hidden Markov Models (HMMs) have applications in several areas of computer security. One drawback of HMMs is the selection of appropriate model parameters, which is often ad hoc or requires domain-specific knowledge. While algorithms exist to find local optima for some parameters, the number of states must always be specified and directly impacts the accuracy and generality of the model. In addition, domain knowledge is not always available or may be based on assumptions that prove incorrect or sub-optimal. We apply the e-machine - a special type of HMM - to the task of constructing network protocol models solely from network traffic. Unlike previous approaches, e-machine reconstruction infers the minimal HMM architecture directly from data and is well suited to applications such as anomaly detection. We draw distinctions between our approach and previous research, and discuss the benefits and challenges of e-machines for protocol model inference.© Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 2010.

Cite

CITATION STYLE

APA

Whalen, S., Bishop, M., & Crutchfield, J. P. (2010). Hidden Markov models for automated protocol learning. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering (Vol. 50 LNICST, pp. 415–428). https://doi.org/10.1007/978-3-642-16161-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free