Analyst intuition based Hidden Markov Model on high speed, temporal cyber security big data

Author(s):  
T. T. Teoh ◽  
Y. Y. Nguwi ◽  
Yuval Elovici ◽  
N. M. Cheung ◽  
W. L. Ng
2013 ◽  
Vol 846-847 ◽  
pp. 1359-1363
Author(s):  
Meng Liu ◽  
Wei Zhou ◽  
Yang Wang

With the rapid development of multimedia communications and the computer network technology, video information has a rising proportion in multimedia information. It owns the great amount of data so that it can obtain accurate information for needed video retrieval research, which has become one of the hot topics of research in this field. By taking soccer video for example, this paper firstly analyzes structure of the soccer video and framework structure. Based on this, this paper makes a specific analysis on the extraction of soccer video feature by combining with the literature to apply SSD apparent characteristic. And then, assisted by the improvement of Hidden Markov Model (HMM), this paper constructs the second frame differential method to detect the shot of soccer video. The test results show that the precision of this method is higher in close-up and misjudgment slow motion. However, it has certain leak detection in slow motion replay of high speed movement.


2019 ◽  
Vol 21 (4) ◽  
pp. 14-26 ◽  
Author(s):  
Priti Narwal ◽  
Deepak Kumar ◽  
Shailendra N. Singh

Cloud computing has evolved as a new paradigm for management of an infrastructure and gained ample consideration in both industrial and academic area of research. A hidden Markov model (HMM) combined with Markov games can give a solution that may act as a countermeasure for many cyber security threats and malicious intrusions in a network or in a cloud. A HMM can be trained by using training sequences that may be obtained by analyzing the file traces of packet analyzer like Wireshark network analyzer. In this article, the authors have proposed a model in which HMM can be build using a set of training examples that are obtained by using a network analyzer (i.e., Wireshark). As it is not an intrusion detection system, the obtained file traces may be used as training examples to test a HMM model. It also predicts a probability value for each tested sequence and states if sequence is anomalous or not. A numerical example is also shown in this article that calculates the most optimal sequence of observations for both HMM and state sequence probabilities in case a HMM model is already given.


2017 ◽  
Vol 102 (3) ◽  
pp. 2099-2116 ◽  
Author(s):  
Gunasekaran Manogaran ◽  
V. Vijayakumar ◽  
R. Varatharajan ◽  
Priyan Malarvizhi Kumar ◽  
Revathi Sundarasekar ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document