Hidden markov models in the problem of detecting attacks on computer networks
Čebyševskij sbornik, Tome 22 (2021) no. 5, pp. 391-399.

Voir la notice de l'article provenant de la source Math-Net.Ru

The article deals with the problem of detecting attacks on computer networks. A method of proactive counteraction based on the use of detectors built in the form of hidden Markov models is proposed.
Keywords: mathematical models, information security.
@article{CHEB_2021_22_5_a30,
     author = {V. L. Tokarev},
     title = {Hidden markov models in the problem of detecting attacks on computer networks},
     journal = {\v{C}eby\v{s}evskij sbornik},
     pages = {391--399},
     publisher = {mathdoc},
     volume = {22},
     number = {5},
     year = {2021},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/}
}
TY  - JOUR
AU  - V. L. Tokarev
TI  - Hidden markov models in the problem of detecting attacks on computer networks
JO  - Čebyševskij sbornik
PY  - 2021
SP  - 391
EP  - 399
VL  - 22
IS  - 5
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/
LA  - ru
ID  - CHEB_2021_22_5_a30
ER  - 
%0 Journal Article
%A V. L. Tokarev
%T Hidden markov models in the problem of detecting attacks on computer networks
%J Čebyševskij sbornik
%D 2021
%P 391-399
%V 22
%N 5
%I mathdoc
%U http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/
%G ru
%F CHEB_2021_22_5_a30
V. L. Tokarev. Hidden markov models in the problem of detecting attacks on computer networks. Čebyševskij sbornik, Tome 22 (2021) no. 5, pp. 391-399. http://geodesic.mathdoc.fr/item/CHEB_2021_22_5_a30/

[1] Bazrafshan Z., Hashemi H., Fard S.M.H. and Hamzeh A., “A Survey on Heuristic Malware Detection Techniques”, The 5th Conference on Information and Knowledge Technology (IKT 2013) (Shiraz, 28-30 May 2013), 113–120 | DOI

[2] O.I. Shelukhin, D.Zh. Sakalema, A.S. Filinova, Obnaruzhenie vtorzhenii v kompyuternye seti (setevye anomalii), Goryachaya liniya - Telekom, M., 2013, 220 pp.

[3] Biryukov A.A., Informatsionnaya bezopasnost: zaschita i napadenie, DMK Press, M., 2012, 474 pp.

[4] Kris Kasperski, Kompyuternye virusy iznutri i snaruzhi, Piter, SbP., 2006, 526 pp.

[5] Tokarev V.L., Sychugov A.A., “Obnaruzhenie vredonosnogo programmnogo obespecheniya s ispolzovaniem immunnykh detektorov”, Izvestiya Tulskogo gosudarstvennogo universiteta. Tekhnicheskie nauki, 2017, no. 10, 216–230

[6] Alqurashi S. and Batarfi O., “A Comparison of Malware Detection Techniques Based on Hidden Markov Model”, Journal of Information Security, 7 (2016), 215–223 | DOI

[7] Frazzoli Emilio, “Intro to Hidden Markov Models the Baum-Welch Algorithm”, Aeronautics and Astronautics, Massachusetts Institute of Technology, 2013