A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Anomaly Network Intrusion Detection Using Hidden Markov Model
2016
International Journal of Innovative Computing, Information and Control
Cyberattacks become more sophisticated than before, as they involve intelligent planning with respect to the target machine. The current defense products might not be able to correlate diverse sensor input. For example, a client with low security awareness is in the distributed network environment where the target resides might be compromised and unnoticed, which in turn is used as a stepping stone to intrude the target. The conventional signature-based intrusion detection systems might not be
doi:10.24507/ijicic.12.02.569
fatcat:th5oo2z2ojcnfhyvlyeih3fzta