CFP last date
20 January 2025
Reseach Article

Integrated Bayes Network and Hidden Markov Model for Host based IDS

by Nagaraju Devarakonda, Srinivasulu Pamidi, V Valli Kumari, A Govardhan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 41 - Number 20
Year of Publication: 2012
Authors: Nagaraju Devarakonda, Srinivasulu Pamidi, V Valli Kumari, A Govardhan
10.5120/5841-8080

Nagaraju Devarakonda, Srinivasulu Pamidi, V Valli Kumari, A Govardhan . Integrated Bayes Network and Hidden Markov Model for Host based IDS. International Journal of Computer Applications. 41, 20 ( March 2012), 45-49. DOI=10.5120/5841-8080

@article{ 10.5120/5841-8080,
author = { Nagaraju Devarakonda, Srinivasulu Pamidi, V Valli Kumari, A Govardhan },
title = { Integrated Bayes Network and Hidden Markov Model for Host based IDS },
journal = { International Journal of Computer Applications },
issue_date = { March 2012 },
volume = { 41 },
number = { 20 },
month = { March },
year = { 2012 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume41/number20/5841-8080/ },
doi = { 10.5120/5841-8080 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:30:09.447231+05:30
%A Nagaraju Devarakonda
%A Srinivasulu Pamidi
%A V Valli Kumari
%A A Govardhan
%T Integrated Bayes Network and Hidden Markov Model for Host based IDS
%J International Journal of Computer Applications
%@ 0975-8887
%V 41
%N 20
%P 45-49
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Today Internet is more popular for many users and business applications such as banking, social networks, education, entertainment, scientific research, and recently cloud computing. The number of services provided by the internet service providers through Internet is rapidly increasing. For many applications security has become a serious issue for anyone connected to the Internet. Security should be provided by the ISPs to the Internet users in the form confidentiality, integrity, and authentication. These can be provided through IDS. In our paper we have proposed a simple, easy and efficient approach for building IDS using integrated model of Bayes Net with Hidden Markov Model. The first phase of the model is to build the Bayesian network using the dataset. Once the network is built the conditional probability or joint probability for each node can be determined. The Bayes network has been used as state transition diagram for HMM. The HMM parameters can be estimated using the Bayesian Network. We have used a standard kddcup99 dataset for building the model. This model can be able to differentiate the intruders from normal users with low false positive rate and high true positive rate. The model works for even high dimensional data streams with high performance detection rate and robust to noise.

References
  1. Staff. kfupm. edu. sa/DAD/sanaulla/work/TABU1. doc
  2. L. Rabiner, A tutorial on hidden markov models and selected applications in speech recognition, Proceedings of the IEEE 77 (2) (1989) 257–286.
  3. http://www. kdd. org/kddcup/index. php?section=1999&method=info
  4. http://www. omnisecu. com/security/infrastructure-and-email-security/types-of-intrusion-detection-systems. htm
  5. Hidden Markov Model: http://en. wikipedia. org/wiki/Hidden_Markov_model
  6. Intrusion Detection Systems - INTRODUCTION, DETECTION METHODOLOGIES: http://encyclopedia. jrank. org/articles/pages/6646/Intrusion-Detection-Systems. html
  7. Dorothy E. Denning. An intrusion detection model. IEEE Transactions on Software Engineering, SE-13(2):222–232, 1987.
  8. James P. Anderson. Computer security threat monitoring and surveillance. Technical report, James P. Anderson Co. , 1980.
  9. Richard Heady, George Luger, Arthur Maccabe, and Mark Servilla. The architecture of a network level intrusion detection system. Technical report, University of New Mexico, 1990.
  10. Frederick K. K. : Network Intrusion Detection Signatures. December 19, 2001, http://online. securityfocus. com/infocus/1524
  11. Elson D. :Intrusion Detection, Theory and Practice. March 27, 2000, http://online. securityfocus. com/infocus/ 1203
  12. Frederick K. K. : Network Intrusion Detection Signatures. December 19, 2001, http://online. securityfocus. com/infocus/1524.
  13. P Srinivasulu, D Nagaraju, P Ramesh Kumar, and K NageswaraRao, "Classifying the Network Intrusion Attacks using Data Mining Classification Methods and their Performance Comparison" JCSNS International Journal of Computer Science and Network Security, VOL. 9 No. 6, June 2009.
  14. Nagaraju Devarakonda, Srinivasulu Pamidi, V Valli Kumari, A Govardhan "Outliers Detection as Network Intrusion Detection System Using Multi Layered Framework" Advances in Computer Science and Information Technology: First International Conference on Computer Science and Information Technology, Springer, CCSIT 2011,Jan 2011.
  15. Bayes Nets: http://www. bayesnets. com/#BayesNetsStructureLearning
  16. A Brief Introduction to Graphical Models and Bayesian Networks: http://www. cs. ubc. ca/ ~murphyk/ Bayes/bnintro. html
  17. Bayesian Networks: http://www. autonlab. org/tutorials/bayesnet. html
  18. figment. cse. usf. edu/~sfefilat/data/papers/WeBCT8. 23. pdf
  19. www. cs. brown. edu/research/ai/dynamics/tutorial/Documents/HiddenMarkovModels. html
Index Terms

Computer Science
Information Sciences

Keywords

Ids Bayes Network Hmm Training And Conditional Probability Tables