Using hidden Markov models to evaluate the risks of intrusions system architecture and model validation

58Citations
Citations of this article
12Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Security-oriented risk assessment tools are used to determine the impact of certain events on the security status of a network. Most existing approaches are generally limited to manual risk evaluations that are not suitable for real-time use. In this paper, we introduce an approach to network risk assessment that is novel in a number of ways. First of all, the risk level of a network is determined as the composition of the risks of individual hosts, providing a more precise, fine-grained model. Second, we use Hidden Markov models to represent the likelihood of transitions between security states. Third, we tightly integrate our risk assessment tool with an existing framework for distributed, large-scale intrusion detection, and we apply the results of the risk assessment to prioritize the alerts produced by the intrusion detection sensors. We also evaluate our approach on both simulated and real-world data. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Årnes, A., Valeur, F., Vigna, G., & Kemmerer, R. A. (2006). Using hidden Markov models to evaluate the risks of intrusions system architecture and model validation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4219 LNCS, pp. 145–164). Springer Verlag. https://doi.org/10.1007/11856214_8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free