CFP last date
20 May 2024
Reseach Article

A Survey of Anomaly Detection Techniques and Hidden Markov Model

by Hemlata Sukhwani, Vikas Sharma, Sanjay Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 93 - Number 18
Year of Publication: 2014
Authors: Hemlata Sukhwani, Vikas Sharma, Sanjay Sharma
10.5120/16436-6151

Hemlata Sukhwani, Vikas Sharma, Sanjay Sharma . A Survey of Anomaly Detection Techniques and Hidden Markov Model. International Journal of Computer Applications. 93, 18 ( May 2014), 26-31. DOI=10.5120/16436-6151

@article{ 10.5120/16436-6151,
author = { Hemlata Sukhwani, Vikas Sharma, Sanjay Sharma },
title = { A Survey of Anomaly Detection Techniques and Hidden Markov Model },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 93 },
number = { 18 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume93/number18/16436-6151/ },
doi = { 10.5120/16436-6151 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:16:04.969680+05:30
%A Hemlata Sukhwani
%A Vikas Sharma
%A Sanjay Sharma
%T A Survey of Anomaly Detection Techniques and Hidden Markov Model
%J International Journal of Computer Applications
%@ 0975-8887
%V 93
%N 18
%P 26-31
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An Intrusion detection System is software that is used for the malicious activities performed in the network whether in wired or in wireless. Although there are various techniques implemented for the detection of intrusions but still various techniques are yet to be implemented for the accurate detection of intrusion such that the false positive rate can be minimized. Hidden Markov model is a technique which consists of number of states having initial transition of data and at each transition from one state to another a probability is calculated, this technique can be considered for the detection of intrusions. Here in this paper a complete survey of all the technique implemented for the intrusion detection and their various advantages and disadvantages are discussed such that a new technique can be implemented in future.

References
  1. Gao, Debin, Michael K. Reiter, and Dawn Song. "Beyond output voting: Detecting compromised replicas using HMM-based behavioral distance", IEEE Transactions on Dependable and Secure Computing, vol. 6, no. 2, pp. 96-110, 2009.
  2. Gao, Debin, Michael K. Reiter, and Dawn Song "Behavioral distance measurement using hidden markov models", In Recent Advances in Intrusion Detection, pp. 19-40, Springer Berlin Heidelberg, 2006.
  3. Tan, Kymie, John McHugh, and Kevin Killourhy "Hiding intrusions: From the abnormal to the normal and beyond", In Information Hiding, pp. 1-17, Springer Berlin Heidelberg, 2003.
  4. Wagner, David, and Paolo Soto "Mimicry attacks on host-based intrusion detection systems", In Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 255-264, 2002.
  5. Thottan M. , Ji C. "Anomaly Detection in IP Networks", IEEE Transaction on Signal Processing, Special Issue of Signal Processing in Networking, Vol. 51, No. 8, pp. 2191-2204, 2003.
  6. Wespi, Andreas, Marc Dacier, and Hervé Debar "Intrusion detection using variable-length audit trail patterns", In Recent advances in intrusion detection, pp. 110-129, Springer Berlin Heidelberg, 2000.
  7. Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff "A sense of self for Unix processes", In Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, pp. 120–128, IEEE Computer Society Press, May 1996.
  8. Sekar, R. , Mugdha Bendre, Dinakar Dhurjati, and Pradeep Bollineni "A fast automaton-based method for detecting anomalous program behaviors", In Proceedings 2001 IEEE Symposium on Security and Privacy, pp. 144-155, IEEE, 2001.
  9. Gao, Debin, Michael K. Reiter, and Dawn Song "Gray-box extraction of execution graphs for anomaly detection", In Proceedings of the 11th ACM conference on Computer and communications security, pp. 318-329, 2004.
  10. Feng, Henry Hanping, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, and Weibo Gong "Anomaly detection using call stack information", In Proceedings of IEEE Symposium on Security and Privacy, pp. 62-75, 2003.
  11. A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, J. Srivastava "A comparative Study of Anomaly Detection Schemes in Network Intrusion Detection", A technical report, 2003.
  12. Wassim El-Hajj, Fadi Aloul, Zouheir Trabelsi and Nazar Zaki "On Detecting Port Scanning using Fuzzy Based Intrusion Detection System", International Wireless Communications and Mobile Computing Conference (IWCMC '08), pp. 105 – 110, 2008.
  13. Leonardo Aniello, Giorgia Lodi and Roberto Baldoni "Inter-Domain Stealthy Port Scan Detection through Complex Event Processing", In Proceedings of the 13th European Workshop on Dependable Computing, pp. 67 -72, 2011.
  14. Tan, Xiaobin, and Hongsheng Xi "Hidden semi-Markov model for anomaly detection", Applied Mathematics and Computation, vol. 205, no. 2, pp. 562 – 567, Elsevier 2008.
  15. Zhu Lin and Zhu- Can- Shi "Research into the Network Security Model Blended of Data Stream Mining and Intrusion Detection System", in Proceedings of the IEEE 7th International Conference on Computer Science & Education (ICCSE 2012), pp. 498 – 499, 2012.
  16. Kyung Choi, Xinyi Chen, Shi Li, Mihui Kim, Kijoon Chae, and JungChan Na "Intrusion Detection of NSM Based DoS Attacks Using Data Mining in Smart Grid", OPEN ACCESS Energies, vol. 5, pp. 4091-4109, 2012.
  17. Divya Pal Singh, Pankaj Sharma, Ashish Kumar "Detection of Spoofing attacks in Wireless network and their Remedies", International Journal of Research Review in Engineering Science and Technology ( IJRREST), Volume 1, Issue1, June 2012.
  18. A. Rahul, S. K. Prashanth, B. Suresh kumar, G. Arun "Detection of Intruders and Flooding In Voip Using IDS, Jacobson Fast and Hellinger Distance Algorithms", IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 2, Issue 2, PP 30-36, July-Aug. 2012.
  19. Emil Kuriakose John and Sumaiya Thaseen "Efficient Defense System For IP Spoofing In Networks", computer Science & Information Technology (CS & IT), pp. 185–193, 2012.
Index Terms

Computer Science
Information Sciences

Keywords

IDS Hidden Markov Model Malicious Activity Behavioral Distance