Network Attack Classification and Recognition Using HMM and Improved Evidence Theory
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 4
Abstract
In this paper, a decision model of fusion classification based on HMM-DS is proposed, and the training and recognition methods of the model are given. As the pure HMM classifier can’t have an ideal balance between each model with a strong ability to identify its target and the maximum difference between models. So in this paper, the results of HMM are integrated into the DS framework, and HMM provides state probabilities for DS. The output of each hidden Markov model is used as a body of evidence. The improved evidence theory method is proposed to fuse the results and encounter drawbacks of the pure HMM for improving classification accuracy of the system. We compare our approach with the traditional evidence theory method, other representative improved DS methods, pure HMM method and common classification methods. The experimental results show that our proposed method has a significant practical effect in improving the training process of network attack classification with high accuracy.
Authors and Affiliations
Gang Luo, Ya Wen, Lingyun Xiang
Standardization of Cloud Security using Mamdani Fuzzifier
Cloud health has consistently been a major issue in information technology. In the CC environment, it becomes particularly serious because the data is located in different places even in the entire globe. Associations ar...
Mobile Learning Application Development for Improvement of English Listening Comprehension
Trend towards English language learning has been increased because it is considered as Lingua franca i.e. language of communication for all. However students of Pakistan are behind in this pace, especially rural elementa...
A Survey of Spam Detection Methods on Twitter
Twitter is one of the most popular social media platforms that has 313 million monthly active users which post 500 million tweets per day. This popularity attracts the attention of spammers who use Twitter for their mali...
V-ITS: Video-based Intelligent Transportation System for Monitoring Vehicle Illegal Activities
Vehicle monitoring is a challenging task for video-based intelligent transportation system (V-ITS). Nowadays, the V-ITS system has a significant socioeconomic impact on the development of smart cities and always demand t...
Predicting Future Gold Rates using Machine Learning Approach
Historically, gold was used for supporting trade transactions around the world besides other modes of payment. Various states maintained and enhanced their gold reserves and were recognized as wealthy and progressive sta...