Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 374260, 7 pages
http://dx.doi.org/10.1155/2014/374260
Research Article

The Application of Baum-Welch Algorithm in Multistep Attack

1College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050000, China
2College of Information Technology, Hebei Normal University, Shijiazhuang 050000, China
3The First Aeronautics College of PLAAF, Xinyang 464000, China

Received 8 April 2014; Accepted 6 May 2014; Published 28 May 2014

Academic Editor: Yuxin Mao

Copyright © 2014 Yanxue Zhang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. L. Xie, S. Y. Jiang, and Q. S. Zhang, “Application-ialer DDoS attack detection based on request keywords,” Computer Science, vol. 40, no. 7, pp. 121–125, 2013. View at Google Scholar
  2. C. Yuan, Research on Multi-Step Attack Detection Method Based on GCT, Jilin University, Jilin, China, 2010.
  3. C. Chen and B. Q. Yan, “Network attack forecast algorithm for multi-step attack,” Computer Engineering, vol. 5, no. 37, pp. 172–174, 2011. View at Google Scholar
  4. G. Q. Zhai and S. Y. Zhou, “Construction and implementation of multistep attacks alert correlation model,” Journal of Computer Applications, vol. 31, no. 5, pp. 1276–1279, 2011. View at Google Scholar
  5. Z. L. Wang and X. P. Cheng, “An Attack predictive algorithm based on the correlation of intrusion alerts in intrusion response,” Computer Science, vol. 32, no. 4, pp. 144–146, 2005. View at Google Scholar
  6. H. Cao, Q. Q. Wang, Z. Y. Ma et al., “Attack Predition model based on dynamic bayesian games,” Computer Applications, vol. 27, no. 6, pp. 1545–1547, 2007. View at Google Scholar
  7. H. Cao, Q. Q. Wang, Z. Y. Ma et al., “Attack predition model based on static Bayesian game,” Application Research of Computers, vol. 24, no. 10, pp. 122–124, 2007. View at Google Scholar
  8. J.-W. Zhuge, X.-H. Han, Z.-Y. Ye, and W. Zou, “Network attack plan recognition algorithm based on the extended goal graph,” Chinese Journal of Computers, vol. 29, no. 8, pp. 1356–1366, 2006. View at Google Scholar · View at Scopus
  9. S. H. Zhang, Research on Network Security Early Warning Technology Based on Hidden Markov Model, PLA Information Engineering University, Henan, China, 2007.