Abstract

The importance of cyber security has increased with the networked and highly complex structure of computer systems, and the increased value of information. In this paper, we compare Conditional Random Field based intrusion detection with the other probabilistic models based intrusion detection. Theses methods uses the sequence characteristics of network traffic in the control system communication. The learning only utilizes normal data, assuming that there is no prior knowledge on attacks in the system. We applied these two probabilistic models to intrusion detection in DARPA data and an experimental control system network, and compared the differences in the performance.KeywordsCRFHMMControl System CommunicationIntrusion DetectionSequence

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call