Intrusion prediction is a key task for forecasting network intrusions. Intrusion detection systems have been primarily deployed as a first line of defence in a network, however; they often suffer from practical testing and evaluation due to unavailability of rich datasets. This paper evaluates the detection accuracy of determining all states (AS), the current state (CS), and the prediction of next state (NS) of an observation sequence, using the two conventional Hidden Markov Model (HMM) training algorithms, namely, Baum Welch (BW) and Viterbi Training (VT). Both BW and VT were initialised using uniform, random and count-based parameters and the experiment evaluation was conducted on the CSE-CICIDS2018 dataset. Results show that the BW and ...
This research was supported and funded by the Government of the Sultanate of Oman represented by the...
Cyberattacks are becoming more sophisticated as attackers continuously use diverse strategies and ta...
Intrusion Detection System (IDS) has become an integral component in the field of network security. ...
Intrusion prediction is a key task for forecasting network intrusions. Intrusion detection systems h...
The global surge of cyber-attacks in the form of sequential network attacks has propelled the need f...
This code reproduces the results for the research paper titled Contemporary Sequential Network Attac...
This paper demonstrates that it is possible to model attacks witha low number of states and classify...
Recently hidden Markov model (HMM) has been proved to be a good tool to model normal behaviours of p...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Distributed Denial of Service (DDoS), is a coordinated attack that is majorly carried out on a massi...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions ...
AbstractAcross the globe, billions of dollars are spending every year to provide security to the net...
Abstract—Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecti...
Distributed denial of service (DDoS) attack bombards the network with loads of packets and requests ...
This research was supported and funded by the Government of the Sultanate of Oman represented by the...
Cyberattacks are becoming more sophisticated as attackers continuously use diverse strategies and ta...
Intrusion Detection System (IDS) has become an integral component in the field of network security. ...
Intrusion prediction is a key task for forecasting network intrusions. Intrusion detection systems h...
The global surge of cyber-attacks in the form of sequential network attacks has propelled the need f...
This code reproduces the results for the research paper titled Contemporary Sequential Network Attac...
This paper demonstrates that it is possible to model attacks witha low number of states and classify...
Recently hidden Markov model (HMM) has been proved to be a good tool to model normal behaviours of p...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Distributed Denial of Service (DDoS), is a coordinated attack that is majorly carried out on a massi...
Cyber security has become a matter of a global interest and several attacks target industrial compan...
Intrusion detection is only a starting step in securing IT infrastructure. Prediction of intrusions ...
AbstractAcross the globe, billions of dollars are spending every year to provide security to the net...
Abstract—Hidden Markov Models (HMMs) have been shown to provide a high level performance for detecti...
Distributed denial of service (DDoS) attack bombards the network with loads of packets and requests ...
This research was supported and funded by the Government of the Sultanate of Oman represented by the...
Cyberattacks are becoming more sophisticated as attackers continuously use diverse strategies and ta...
Intrusion Detection System (IDS) has become an integral component in the field of network security. ...