首页    期刊浏览 2024年12月03日 星期二
登录注册

文章基本信息

  • 标题:Denial-of-Service, Probing, User to Root (U2R) & Remote to User (R2L) Attack Detection using Hidden Markov Models
  • 本地全文:下载
  • 作者:Ali Alharbi ; Sulaiman Alhaidari ; Mohamed Zohdy
  • 期刊名称:International Journal of Computer and Information Technology
  • 印刷版ISSN:2279-0764
  • 出版年度:2018
  • 卷号:7
  • 期号:5
  • 页码:204-210
  • 出版社:International Journal of Computer and Information Technology
  • 摘要:at present, an increase in the level of insecurity due to unauthorized attacks and an increase in the crime rate. There is hence the need for secure systems that can ensure high-level security to guarantee safety and trusted communication. To ensure secure data communication over the internet and any other network there is the need to get rid of the threat of intrusions and misuses. Potential attackers pose great threats to the information security of the systems. Users seek to control these threats, recognition of attacks to increase safety. The attacks that affect a large number of computers in the world daily can be classified into four attacks and these include Probing, Denial of Service (DoS), User to Root (U2R), Remote to User (R2L) attacks. Researchers have found the study of attack detection and prevention of computers from them to be a major concern throughout the world. Owing to the desire of many researchers, this paper seeks to propose the idea of HMM based approach in the detection of Probing, DoS, U2R and R2L attacks on the system. To accomplish this, the paper will examine the matter of attack detection in computer systems, the significance of the computer security problem in general and attack detection in specific is also examined. Four salient types of attacks will then examined in detail to establish how they work. This will be followed by a brief examination of how hidden Markov models (HMM) is of use in this context and finally an investigation of the strategies behind and various constituent sub-problems of HMM.
  • 关键词:Hidden Markov Model; Probing; Denial of Service; User to Root; and Remote to User attacks; NSL;KDD
国家哲学社会科学文献中心版权所有