Robustness of the Markov-chain model for cyber-attack detection

@article{Ye2004RobustnessOT,
  title={Robustness of the Markov-chain model for cyber-attack detection},
  author={N. Ye and Yebin Zhang and C. Borror},
  journal={IEEE Transactions on Reliability},
  year={2004},
  volume={53},
  pages={116-123}
}
  • N. Ye, Yebin Zhang, C. Borror
  • Published 2004
  • Computer Science
  • IEEE Transactions on Reliability
  • Cyber-attack detection is used to identify cyber-attacks while they are acting on a computer and network system to compromise the security (e.g., availability, integrity, and confidentiality) of the system. This paper presents a cyber-attack detection technique through anomaly-detection, and discusses the robustness of the modeling technique employed. In this technique, a Markov-chain model represents a profile of computer-event transitions in a normal/usual operating condition of a computer… CONTINUE READING
    181 Citations
    Detection of Integrity Attacks in Cyber-Physical Critical Infrastructures Using Ensemble Modeling
    • S. Ntalampiras
    • Computer Science
    • IEEE Transactions on Industrial Informatics
    • 2015
    • 60
    Characterization of cyber attacks through variable length Markov models
    • 7
    Investigation of a Markov Model for Computer System Security Threats
    Defending malicious attacks in Cyber Physical Systems
    • 15
    Error analysis of sequence modeling for projecting cyber attacks
    Probabilistic approach for Intrusion Detection System - FOMC technique
    • A. S. Aneetha, S. Bose
    • Computer Science
    • 2014 Sixth International Conference on Advanced Computing (ICoAC)
    • 2014
    • 2
    TANDI: threat assessment of network data and information
    • 43
    ANOMALY NETWORK INTRUSION DETECTION USING HIDDEN MARKOV MODEL
    • 15
    • PDF
    Attack-norm separation for detecting attack-induced quality problems on computers and networks
    • N. Ye, Qiang Chen
    • Computer Science
    • Qual. Reliab. Eng. Int.
    • 2007
    • 3

    References

    SHOWING 1-10 OF 58 REFERENCES
    Building survivable systems: an integrated approach based on intrusion detection and damage containment
    • 57
    • PDF
    Intrusion detection systems and multisensor data fusion
    • 574
    • PDF
    An Intrusion-Detection Model
    • D. Denning
    • Computer Science
    • 1986 IEEE Symposium on Security and Privacy
    • 1986
    • 1,212
    • PDF
    Design and implementation of a scalable intrusion detection system for the protection of network infrastructure
    • Y. F. Jou, F. Gong, +4 authors F. Wang
    • Computer Science
    • Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
    • 2000
    • 81
    Towards a taxonomy of intrusion-detection systems
    • 842
    • PDF
    A neural network component for an intrusion detection system
    • H. Debar, M. Becker, D. Siboni
    • Computer Science
    • Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy
    • 1992
    • 555
    • PDF
    Computer Intrusion Detection Based on Bayes Factors for Comparing Command Transition Probabilities
    • 75
    • PDF