Research Article

The Application of Baum-Welch Algorithm in Multistep Attack

Algorithm 1

Input: alert sequence.
     ;
Output: the parameters of hidden Markov model.
    .
Step  1. Initialization.
    for , select , we can obtain the initial model .
Step  2. Iterative calculation.
for ,
;
;
.
where ;
     .
Step  3. Termination. We can obtain the parameters of hidden Markov model.
.