{"id":"https://openalex.org/W2166683449","doi":"https://doi.org/10.1145/1143549.1143619","title":"System approach to intrusion detection using hidden Markov model","display_name":"System approach to intrusion detection using hidden Markov model","publication_year":2006,"publication_date":"2006-07-03","ids":{"openalex":"https://openalex.org/W2166683449","doi":"https://doi.org/10.1145/1143549.1143619","mag":"2166683449"},"language":"en","primary_location":{"id":"doi:10.1145/1143549.1143619","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038426107","display_name":"Rahul Khanna","orcid":"https://orcid.org/0000-0001-8101-4655"},"institutions":[{"id":"https://openalex.org/I1343180700","display_name":"Intel (United States)","ror":"https://ror.org/01ek73717","country_code":"US","type":"company","lineage":["https://openalex.org/I1343180700"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Rahul Khanna","raw_affiliation_strings":["Intel Corporation, Hillsboro, OR"],"affiliations":[{"raw_affiliation_string":"Intel Corporation, Hillsboro, OR","institution_ids":["https://openalex.org/I1343180700"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101678495","display_name":"Huaping Liu","orcid":"https://orcid.org/0000-0001-7419-2947"},"institutions":[{"id":"https://openalex.org/I131249849","display_name":"Oregon State University","ror":"https://ror.org/00ysfqy60","country_code":"US","type":"education","lineage":["https://openalex.org/I131249849"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Huaping Liu","raw_affiliation_strings":["Oregon State University, Corvallis, OR"],"affiliations":[{"raw_affiliation_string":"Oregon State University, Corvallis, OR","institution_ids":["https://openalex.org/I131249849"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038426107"],"corresponding_institution_ids":["https://openalex.org/I1343180700"],"apc_list":null,"apc_paid":null,"fwci":6.3374,"has_fulltext":false,"cited_by_count":52,"citation_normalized_percentile":{"value":0.96826646,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"349","last_page":"354"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hidden-markov-model","display_name":"Hidden Markov model","score":0.835853636264801},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.8081506490707397},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7576166391372681},{"id":"https://openalex.org/keywords/mixture-model","display_name":"Mixture model","score":0.6146743297576904},{"id":"https://openalex.org/keywords/cluster-analysis","display_name":"Cluster analysis","score":0.5162618160247803},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4747070372104645},{"id":"https://openalex.org/keywords/gaussian","display_name":"Gaussian","score":0.4227627217769623},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4161488711833954},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.4050320088863373}],"concepts":[{"id":"https://openalex.org/C23224414","wikidata":"https://www.wikidata.org/wiki/Q176769","display_name":"Hidden Markov model","level":2,"score":0.835853636264801},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.8081506490707397},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7576166391372681},{"id":"https://openalex.org/C61224824","wikidata":"https://www.wikidata.org/wiki/Q2260434","display_name":"Mixture model","level":2,"score":0.6146743297576904},{"id":"https://openalex.org/C73555534","wikidata":"https://www.wikidata.org/wiki/Q622825","display_name":"Cluster analysis","level":2,"score":0.5162618160247803},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4747070372104645},{"id":"https://openalex.org/C163716315","wikidata":"https://www.wikidata.org/wiki/Q901177","display_name":"Gaussian","level":2,"score":0.4227627217769623},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4161488711833954},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.4050320088863373},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1143549.1143619","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1143549.1143619","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2006 international conference on Wireless communications and mobile computing","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320332180","display_name":"Defense Advanced Research Projects Agency","ror":"https://ror.org/02caytj08"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W1536864280","https://openalex.org/W1582506709","https://openalex.org/W1585610988","https://openalex.org/W1592090113","https://openalex.org/W1634927171","https://openalex.org/W1679913846","https://openalex.org/W1965555277","https://openalex.org/W1968980002","https://openalex.org/W1976625337","https://openalex.org/W1985690171","https://openalex.org/W2022775778","https://openalex.org/W2073165180","https://openalex.org/W2107035663","https://openalex.org/W2123886726","https://openalex.org/W2125838338","https://openalex.org/W2133794215","https://openalex.org/W2152084087","https://openalex.org/W2170973665","https://openalex.org/W2615105684","https://openalex.org/W4213332169","https://openalex.org/W4285719527","https://openalex.org/W4302328504","https://openalex.org/W6668618797"],"related_works":["https://openalex.org/W2053269318","https://openalex.org/W2364370872","https://openalex.org/W2025614924","https://openalex.org/W2294335174","https://openalex.org/W2097963413","https://openalex.org/W3145575561","https://openalex.org/W4324119469","https://openalex.org/W2164868312","https://openalex.org/W2160650576","https://openalex.org/W1578916557"],"abstract_inverted_index":{"In":[0,78],"an":[1,58,105,127,143,167],"era":[2],"of":[3,21,112,120],"cooperating":[4],"ad":[5],"hoc":[6],"networks":[7],"and":[8,28,61,142],"pervasive":[9],"wireless":[10],"connectivity,":[11],"we":[12,81],"are":[13,24,100],"becoming":[14],"more":[15],"vulnerable":[16],"to":[17,74,103,150],"malicious":[18],"attacks.":[19],"Many":[20],"these":[22],"attacks":[23,51],"silent":[25],"in":[26,72,109],"nature":[27],"cannot":[29],"be":[30,64],"detected":[31],"by":[32,66,163],"the":[33,54,68,152],"conventional":[34],"intrusion":[35,59,90,153],"detection":[36,91],"system":[37,70],"(IDS)":[38],"methods":[39],"such":[40],"as":[41],"traffic":[42],"monitoring,":[43],"port":[44],"scanning,":[45],"or":[46,162],"protocol":[47],"violations.":[48],"These":[49],"sophisticated":[50],"operate":[52],"under":[53],"threshold":[55],"boundaries":[56],"during":[57],"attempt":[60],"can":[62],"only":[63],"identified":[65],"profiling":[67],"complete":[69],"activity":[71],"relation":[73],"a":[75,83,93,110,113,121,130,133,136],"normal":[76,160],"behavior.":[77],"this":[79,148],"paper":[80],"discuss":[82],"hidden":[84,114],"Markov":[85],"model":[86,96,117,139],"(HMM)":[87],"strategy":[88],"for":[89,97,124],"using":[92],"multivariate":[94],"Gaussian":[95,137],"observations":[98],"that":[99,107],"then":[101],"used":[102],"predict":[104,151],"attack":[106,169],"exists":[108],"form":[111],"state.":[115],"This":[116],"is":[118],"comprised":[119],"self-organizing":[122],"network":[123],"event":[125],"clustering,":[126],"observation":[128,157],"classifier,":[129],"drift":[131],"detector,":[132],"profile":[134],"estimator,":[135],"mixture":[138],"(GMM)":[140],"accelerator,":[141],"HMM":[144],"engine.":[145],"We":[146],"use":[147],"method":[149],"states":[154],"based":[155],"on":[156],"deviation":[158],"from":[159],"profiles":[161],"fitting":[164],"it":[165],"into":[166],"appropriate":[168],"profile.":[170]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":3},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
