Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

An Efficient Intrusion Detection and Prevention System against Insider Attack by User Behavior Mining


     

   Subscribe/Renew Journal


Intrusion Detection Systems (IDS) plays a significant role in computer security. In network surroundings IDS find the activities that have an effect on Confidentiality, Integrity and accessibility on network knowledge. Currently, most computer systems use user IDs and passwords because the login patterns to certify users. However, many of us share their login patterns with coworkers and request these coworkers to help co-tasks, thereby creating the pattern united of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are exhausting to find since most intrusion detection systems and firewalls establish and isolate malicious behaviors launched from the external world of the system solely. Additionally, some studies claimed that analyzing system calls (SCs) generated by commands will establish these commands, with that to accurately find attacks, with attack patterns are the options of an attack. Therefore, during this paper, a security system, named the interior Intrusion Detection and Protection System (IIDPS), is projected to find Insider attacks at SC level by victimization data processing and rhetorical techniques. The IIDPS creates users’ personal profiles to stay track of users’ usage habits as their rhetorical options and determines whether or not a sound login user is that the account holder or not by scrutiny his/her current laptop usage behaviors with the patterns collected within the account holder’s personal profile.


Keywords

Data Mining, Identifying Users, Intrusion Detection, System Call (SC).
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 274

PDF Views: 2




  • An Efficient Intrusion Detection and Prevention System against Insider Attack by User Behavior Mining

Abstract Views: 274  |  PDF Views: 2

Authors

Abstract


Intrusion Detection Systems (IDS) plays a significant role in computer security. In network surroundings IDS find the activities that have an effect on Confidentiality, Integrity and accessibility on network knowledge. Currently, most computer systems use user IDs and passwords because the login patterns to certify users. However, many of us share their login patterns with coworkers and request these coworkers to help co-tasks, thereby creating the pattern united of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are exhausting to find since most intrusion detection systems and firewalls establish and isolate malicious behaviors launched from the external world of the system solely. Additionally, some studies claimed that analyzing system calls (SCs) generated by commands will establish these commands, with that to accurately find attacks, with attack patterns are the options of an attack. Therefore, during this paper, a security system, named the interior Intrusion Detection and Protection System (IIDPS), is projected to find Insider attacks at SC level by victimization data processing and rhetorical techniques. The IIDPS creates users’ personal profiles to stay track of users’ usage habits as their rhetorical options and determines whether or not a sound login user is that the account holder or not by scrutiny his/her current laptop usage behaviors with the patterns collected within the account holder’s personal profile.


Keywords


Data Mining, Identifying Users, Intrusion Detection, System Call (SC).