A Survey of Anomaly Detection Techniques and Hidden Markov Model

  • Sukhwani H
  • Sharma V
  • Sharma S
N/ACitations
Citations of this article
11Readers
Mendeley users who have this article in their library.

Abstract

An Intrusion detection System is software that is used for the malicious activities performed in the network whether in wired or in wireless. Although there are various techniques implemented for the detection of intrusions but still various techniques are yet to be implemented for the accurate detection of intrusion such that the false positive rate can be minimized. Hidden Markov model is a technique which consists of number of states having initial transition of data and at each transition from one state to another a probability is calculated, this technique can be considered for the detection of intrusions. Here in this paper a complete survey of all the technique implemented for the intrusion detection and their various advantages and disadvantages are discussed such that a new technique can be implemented in future.

Cite

CITATION STYLE

APA

Sukhwani, H., Sharma, V., & Sharma, S. (2014). A Survey of Anomaly Detection Techniques and Hidden Markov Model. International Journal of Computer Applications, 93(18), 26–31. https://doi.org/10.5120/16436-6151

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free