A Security Situation Prediction Algorithm Based on HMM in Mobile Network

The increasingly severe network security situation brings unanticipated challenges to mobile networking. Traditional HMM (Hidden Markov Model) based algorithms for predicting the network security are not accurate, and to address this issue, a weighted HMM based algorithm is proposed to predict the security situation of the mobile network. The multiscale entropy is used to address the low speed of data training in mobile network, whereas the parameters of HMM situation transition matrix are also optimized. Moreover, the autocorrelation coefficient can reasonably use the association between the characteristics of the historical data to predict future security situation. Experimental analysis on DARPA2000 shows that the proposed algorithm is highly competitive, with good performance in prediction speed and accuracy when compared to existing design.

[1]  Tan Xiao A Hidden Markov Model Used in Intrusion Detection , 2003 .

[2]  Feng Yao The Application of Weighted Markov\|Chain to the Prediction of River Runoff State , 1999 .

[3]  Wei Liang,et al.  A distributed data secure transmission scheme in wireless sensor network , 2017, Int. J. Distributed Sens. Networks.

[4]  Tim Bass,et al.  Intrusion detection systems and multisensor data fusion , 2000, CACM.

[5]  Arumugam Nallanathan,et al.  Industrial wireless sensor networks 2016 , 2017, Int. J. Distributed Sens. Networks.

[6]  D. Marquis,et al.  Assessing Network Infrastructure Vulnerabilities to Physical Layer Attacks , 1999 .

[7]  Guo-Long Chen,et al.  Research of Network Security Situation Prediction Based on Multidimensional Cloud Model , 2012, 2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[8]  Dhanashri Ashok Bhosale,et al.  Comparative study and analysis of network intrusion detection tools , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[9]  J. Álvarez-Ramírez,et al.  Multiscale entropy analysis of crude oil price dynamics , 2011 .

[10]  Wei Liang,et al.  RESH: A Secure Authentication Algorithm Based on Regeneration Encoding Self-Healing Technology in WSN , 2016, J. Sensors.

[11]  Xiaodong Zheng,et al.  Multiscale Entropy-Based Weighted Hidden Markov Network Security Situation Prediction Model , 2017, 2017 IEEE International Congress on Internet of Things (ICIOT).

[12]  Peng Zhang,et al.  A traffic flow state transition model for urban road network based on Hidden Markov Model , 2016, Neurocomputing.

[13]  Xiaodai Dong,et al.  Locally minimum storage regenerating codes in distributed cloud storage systems , 2017, China Communications.

[14]  Constantinos S. Pattichis,et al.  Multiscale entropy-based approach to automated surface EMG classification of neuromuscular disorders , 2010, Medical & Biological Engineering & Computing.

[15]  Yung-Wey Chong,et al.  Optimized access point selection with mobility prediction using hidden Markov Model for wireless network , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).

[16]  什洛莫·图布尔 System and method for providing network security to mobile devices , 2006 .

[17]  Giovanni Vigna,et al.  Using hidden markov models to evaluate the risks of intrusions : System architecture and model validation , 2006 .

[18]  Wei Liang,et al.  A two-step MF signal acquisition method for wireless underground sensor networks , 2016, Comput. Sci. Inf. Syst..

[19]  Christopher Krügel,et al.  Alert Verification Determining the Success of Intrusion Attempts , 2004, DIMVA.

[20]  Chung-Kang Peng,et al.  Costa, Goldberger, and Peng Reply: , 2003 .

[21]  Jiang,et al.  A scalable model for network situational awareness based on Endsley' s situation model , 2007 .

[22]  Peter Kortis,et al.  Commercial and open-source based Intrusion Detection System and Intrusion Prevention System (IDS/IPS) design for an IP networks , 2015, 2015 13th International Conference on Emerging eLearning Technologies and Applications (ICETA).

[23]  Alfonso Valdes,et al.  A Mission-Impact-Based Approach to INFOSEC Alarm Correlation , 2002, RAID.

[24]  Liang Hu,et al.  Multi-stage Attack Detection Algorithm Based on Hidden Markov Model , 2012, WISM.

[25]  Giovanni Vigna,et al.  Using Hidden Markov Models to Evaluate the Risks of Intrusions , 2006, RAID.

[26]  Yan Ruo-yu,et al.  Multi-scale Entropy Based Traffic Analysis and Anomaly Detection , 2008, 2008 Eighth International Conference on Intelligent Systems Design and Applications.

[27]  Sherif Abdelwahed,et al.  A Finite State Hidden Markov Model for Predicting Multistage Attacks in Cloud Systems , 2014, 2014 IEEE 12th International Conference on Dependable, Autonomic and Secure Computing.

[28]  Jing Wang,et al.  Device-to-Device Relay Cooperative Transmission Based on Network Coding , 2017, KSII Transactions on Internet and Information Systems.

[29]  Heng Wu,et al.  Low-Latency and Energy-Efficient Data Preservation Mechanism in Low-Duty-Cycle Sensor Networks , 2017, Sensors.

[30]  Madalena Costa,et al.  Multiscale entropy analysis of biological signals. , 2005, Physical review. E, Statistical, nonlinear, and soft matter physics.