A Novel Approach to Detect Network Attacks Using G-HMM-Based Temporal Relations between Internet Protocol Packets

  • Taeshik Shon
  • Kyusuk Han
  • James J. (Jong Hyuk) Park
  • Hangbae Chang
Open Access
Research Article


This paper introduces novel attack detection approaches on mobile and wireless device security and network which consider temporal relations between internet packets. In this paper we first present a field selection technique using a Genetic Algorithm and generate a Packet-based Mining Association Rule from an original Mining Association Rule for Support Vector Machine in mobile and wireless network environment. Through the preprocessing with PMAR, SVM inputs can account for time variation between packets in mobile and wireless network. Third, we present Gaussian observation Hidden Markov Model to exploit the hidden relationships between packets based on probabilistic estimation. In our G-HMM approach, we also apply G-HMM feature reduction for better initialization. We demonstrate the usefulness of our SVM and G-HMM approaches with GA on MIT Lincoln Lab datasets and a live dataset that we captured on a real mobile and wireless network. Moreover, experimental results are verified by Open image in new window -fold cross-validation test.


Information System System Application Temporal Relation Internet Protocol Full Article 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Publisher note

To access the full article, please see PDF.

Copyright information

© Taeshik Shon et al. 2011

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Authors and Affiliations

  • Taeshik Shon
    • 1
  • Kyusuk Han
    • 2
  • James J. (Jong Hyuk) Park
    • 3
  • Hangbae Chang
    • 4
  1. 1.Division of Information and Computer Engineering, College of Information TechnologyAjou UniversitySuwonRepublic of Korea
  2. 2.Department of Information and Communication EngineeringKorea Advanced Institute of Science and TechnologyDaejeonRepublic of Korea
  3. 3.Department of Computer Science and EngineeringSeoul National University of Science and TechnologySeoulRepublic of Korea
  4. 4.Department of Business AdministrationDaejin UniversityPocheon-SiRepublic of Korea

Personalised recommendations