Please use this identifier to cite or link to this item:
https://dspace.iiti.ac.in/handle/123456789/11695
Title: | A Distinguished Method for Network Intrusion Detection using Random Initialized Viterbi Algorithm in Hidden Markov Model |
Authors: | Sharmila, S. P. Chaudhari, Narendra S. |
Keywords: | Computer crime;Forecasting;Intrusion detection;Network security;Pattern recognition;Viterbi algorithm;Attack detection;Attack prediction;Hidden-Markov models;Intrusion Detection Systems;Intrusion-Detection;Network activities;Network attack;Network attack prediction;Network intrusion detection;Viterbi decoding algorithms;Hidden Markov models |
Issue Date: | 2022 |
Publisher: | Institute of Electrical and Electronics Engineers Inc. |
Citation: | Sharmila, S. P., Shukla, P., & Chaudhari, N. S. (2022). A distinguished method for network intrusion detection using random initialized viterbi algorithm in hidden markov model. Paper presented at the Proceedings - 2022 OITS International Conference on Information Technology, OCIT 2022, 273-277. doi:10.1109/OCIT56763.2022.00059 Retrieved from www.scopus.com |
Abstract: | Intrusion Detection System (IDS) is a system that surveils the dubious network activity. There are several approaches which deal with intrusion detection and cyber-attack detection, but the most optimal IDS would be the one which can predict the upcoming threats along with detecting the present attacks. The Machine Learning probabilistic models work remarkably in prediction of threats among these models, Hidden Markov Model (HMM) outperforms all other models. HMM is widely used in cryptanalysis, gene prediction, computational linguistic, speech analysis as well as its synthesis and network attacks detection and prediction. In this paper, we have proposed a distinct methodology using Viterbi algorithm of HMM which is initialized with the random parameter. Our methodology significantly upsurges the detection accuracy of the current state along with all states, it also enhances the prediction accuracy of the next feasible state when compared to existing approaches. © 2022 IEEE. |
URI: | https://doi.org/10.1109/OCIT56763.2022.00059 https://dspace.iiti.ac.in/handle/123456789/11695 |
Type of Material: | Conference Paper |
Appears in Collections: | Department of Computer Science and Engineering |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
Altmetric Badge: