Efficient Intrusion Detection Method Based on Conditional Random Fields

被引:0
|
作者
Tan, Yunmeng
Liao, Shengbin
Zhu, Cuitao
机构
关键词
Intrusion detection; conditional random field; hidden markov models;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid advancement in the network and communication technologies, intrusion detection becomes a very troublesome problem. An important method for intrusion detection is to model the dynamic behavior of network user based on Hidden Markov Models (HMM), but the HMM model requires strong independence assumptions between the observation sequences of the behaviors of network user, in practice the behaviors of users in networks is dependent. So, this motivates us to use Conditional Random Fields (CRFs) to model the behaviors of users because this model has no assumptions on the dependencies among observation sequences.
引用
收藏
页码:181 / 184
页数:4
相关论文
共 50 条
  • [1] Intrusion detection method based on fuzzy conditional random fields
    Luo, Jun
    Li, Yijun
    Journal of Computational Information Systems, 2013, 9 (20): : 8361 - 8370
  • [2] Intrusion Detection System Based on Conditional Random Fields
    Guleria, Deepa V.
    Chavan, M. K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2013, 13 (12): : 80 - 86
  • [3] Intrusion Detection System based on Hidden Conditional Random Fields
    Luo, Jun
    Gao, Zenghui
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 321 - 336
  • [4] AN EFFICIENT PANSHARPENING METHOD BASED ON CONDITIONAL RANDOM FIELDS
    Yang, Yong
    Lu, Hangyuan
    Huang, Shuying
    Tu, Wei
    2020 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2020,
  • [5] CONDITIONAL RANDOM FIELDS BASED REAL-TIME INTRUSION DETECTION FRAMEWORK
    Gu, Jiaojiao
    Jiang, Wenzhi
    Hu, Wenxuan
    Zhang, Xiaoyu
    3RD INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE (ITCS 2011), PROCEEDINGS, 2011, : 186 - 189
  • [6] An efficient network querying method based on conditional random fields
    Huang, Qiang
    Wu, Ling-Yun
    Zhang, Xiang-Sun
    BIOINFORMATICS, 2011, 27 (22) : 3173 - 3178
  • [7] Layered Approach Using Conditional Random Fields for Intrusion Detection
    Gupta, Kapil Kumar
    Nath, Baikunth
    Kotagiri, Ramamohanarao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2010, 7 (01) : 35 - 49
  • [8] Typed Linear Chain Conditional Random Fields and Their Application to Intrusion Detection
    Elfers, Carsten
    Horstmann, Mirko
    Sohr, Karsten
    Herzog, Otthein
    INTELLIGENT DATA ENGINEERING AND AUTOMATED LEARNING - IDEAL 2010, 2010, 6283 : 13 - 20
  • [9] A Simple and Efficient Model Pruning Method for Conditional Random Fields
    Zhao, Hai
    Kit, Chunyu
    COMPUTER PROCESSING OF ORIENTAL LANGUAGES: LANGUAGE TECHNOLOGY FOR THE KNOWLEDGE-BASED ECONOMY, 2009, 5459 : 145 - 155
  • [10] Intrusion Detection by Pipelined Approach Using Conditional Random Fields and Optimization Using SVM
    Jayaprakash, R.
    Uma, V.
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 2, 2011, 191 : 656 - 665