Policy Misuse Detection in Communication Networks with Hidden Markov Models

dc.contributor.authorTosun, Umut
dc.date.accessioned2019-12-11T14:40:45Z
dc.date.available2019-12-11T14:40:45Z
dc.date.issued2014
dc.description.abstractWith the recent advances in computer networking applications, Intrusion Detection Systems (IDS) are widely used to detect the malicious connections in computer networks. IDS provide a high level security between organizations while preventing misuses and intrusions in data communication through internet or any other network. Adherence to network usage policies is crucial since a system or network administrator needs to be informed whether the information is compromised, if the resources are appropriately used or if an attacker exploits a comprised service. Server flow authentication via protocol detection analyzes penetrations to a communication network. Generally, port numbers in the packet headers are used to detect the protocols. However, it is easy to re-map port numbers via proxies and changing the port number via compromised host services. Using port numbers may be misleading for a system administrator to understand the natural flow of communications through network. It is also difficult to understand the user behavior when the traffic is encrypted since there is only packet level information to be considered. In this paper, we present a novel approach via Hidden Markov Models to detect user behavior in network traffic. We perform the detection process on timing measures of packets. The results are promising and we obtained classification accuracies between %70 and %100. (C) 2014 Published by Elsevier B.V.en_US
dc.identifier.endpage952en_US
dc.identifier.issn1877-0509
dc.identifier.scopus2-s2.0-84902661065en_US
dc.identifier.startpage947en_US
dc.identifier.urihttps://reader.elsevier.com/reader/sd/pii/S1877050914007169?token=3BC8EC65E5FD86CD195BF8AE1AF2D103D57DBEAF3E29F3070073490D0803FB60724A9C25B72B8FE3C7027CF5DB17880B
dc.identifier.urihttp://hdl.handle.net/11727/4394
dc.identifier.volume32en_US
dc.identifier.wos000361562600123en_US
dc.language.isoengen_US
dc.relation.isversionof10.1016/j.procs.2014.05.516en_US
dc.relation.journal5TH INTERNATIONAL CONFERENCE ON AMBIENT SYSTEMS, NETWORKS AND TECHNOLOGIES (ANT-2014), THE 4TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY (SEIT-2014)en_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectPolicy Misuseen_US
dc.subjectHidden Markov Modelsen_US
dc.titlePolicy Misuse Detection in Communication Networks with Hidden Markov Modelsen_US
dc.typeProceedings Paperen_US

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
1-s2.0-S1877050914007169-main.pdf
Size:
226.77 KB
Format:
Adobe Portable Document Format
Description:

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: