Attack Prediction using Hidden Markov Model

06/03/2021
by   Shuvalaxmi Dass, et al.
0

It is important to predict any adversarial attacks and their types to enable effective defense systems. Often it is hard to label such activities as malicious ones without adequate analytical reasoning. We propose the use of Hidden Markov Model (HMM) to predict the family of related attacks. Our proposed model is based on the observations often agglomerated in the form of log files and from the target or the victim's perspective. We have built an HMM-based prediction model and implemented our proposed approach using Viterbi algorithm, which generates a sequence of states corresponding to stages of a particular attack. As a proof of concept and also to demonstrate the performance of the model, we have conducted a case study on predicting a family of attacks called Action Spoofing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/18/2020

Deflecting Adversarial Attacks

There has been an ongoing cycle where stronger defenses against adversar...
research
07/25/2018

Architectures for Detecting Real-time Multiple Multi-stage Network Attacks Using Hidden Markov Model

With the growing Cyber threats, the need to develop high assurance Cyber...
research
11/07/2018

Optimized Hidden Markov Model based on Constrained Particle Swarm Optimization

As one of Bayesian analysis tools, Hidden Markov Model (HMM) has been us...
research
04/24/2019

Predicting Student Performance in an Educational Game Using a Hidden Markov Model

Contributions: Prior studies on education have mostly followed the model...
research
11/03/2014

Active Inference for Binary Symmetric Hidden Markov Models

We consider active maximum a posteriori (MAP) inference problem for Hidd...
research
06/25/2023

Computational Asymmetries in Robust Classification

In the context of adversarial robustness, we make three strongly related...
research
04/19/2020

Extended Abstract of Performance Analysis and Prediction of Model Transformation

In the software development process, model transformation is increasingl...

Please sign up or login with your details

Forgot password? Click here to reset