[1] 张松红, 王亚弟, 韩继红. 基于隐马尔可夫模型的复合攻击预测方法[J]. 计算机工程, 2008, 34(6): 131-133. Zhang Songhong, Wang Yadi, Han Jihong. Approach to forecasting multi-step attack based on HMM[J]. Computer Engineering, 2008, 34(6): 131-133.
[2] Zhang Yanxue, Zhao Dangmei, Liu Jinxing. Approach to forecasting multi-step attack based on fuzzy hidden Markov model[J]. Journal of Applied Sciences, 2013, 13(22): 4955-4960.
[3] 张艳雪, 赵冬梅, 刘金星. 基于模糊-隐马尔可夫模型的复合式攻击预测方法[J]. 电光与控制, 2015, 22(1): 39-44. Zhang Yanxue, Zhao Daogmei, Liu Jinxing. Approach to forecasting multi-stage attack based on fuzzy hidden Markov model[J]. Electronics Optics & Control, 2015, 22(1): 39-44.
[4] 杨晓峰, 孙明明, 胡雪蕾. 基于改进隐马尔可夫模型的网络攻击检测方法[J]. 通信学报, 2010, 31(3): 95-101. Yang Xiaofeng, Sun Mingming, Hu Xuelei, et al. Improved HMM model based method for detecting cyber attacks[J]. Journal on Communications, 2010, 31(3): 95-101.
[5] 周东清, 张海锋, 张绍武等. 基于HMM的分布式拒绝服务攻击检测方法[J]. 计算机研究与发展, 2005, 42(9):1594-1599. Zhou Dongqing, Zhang Haifeng, Zhang Shaowu, et al. A DDos attack detection method based on hidden Markov Model[J]. Journal of Computer Research and Development, 2005, 42(9):1594-1599.
[6] Yolacan E N, Dy JG, Kaeli D R. System call anomaly detection using multi-HMMs[C]//2014 Eighth International Conference on Software Security and Reliability-Companion.[S.l.]: IEEE, 2014: 25-30. |