Open Access Open Access  Restricted Access Subscription or Fee Access

An Efficient Intrusion Detection and Prevention System against Insider Attack by User Behavior Mining

N. Birla, M. Jagadish, E. Venkatesan

Abstract


Intrusion Detection Systems (IDS) plays a significant role in computer security. In network surroundings IDS find the activities that have an effect on Confidentiality, Integrity and accessibility on network knowledge. Currently, most computer systems use user IDs and passwords because the login patterns to certify users. However, many of us share their login patterns with coworkers and request these coworkers to help co-tasks, thereby creating the pattern united of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are exhausting to find since most intrusion detection systems and firewalls establish and isolate malicious behaviors launched from the external world of the system solely. Additionally, some studies claimed that analyzing system calls (SCs) generated by commands will establish these commands, with that to accurately find attacks, with attack patterns are the options of an attack. Therefore, during this paper, a security system, named the interior Intrusion Detection and Protection System (IIDPS), is projected to find Insider attacks at SC level by victimization data processing and rhetorical techniques. The IIDPS creates users’ personal profiles to stay track of users’ usage habits as their rhetorical options and determines whether or not a sound login user is that the account holder or not by scrutiny his/her current laptop usage behaviors with the patterns collected within the account holder’s personal profile.


Keywords


Data Mining, Identifying Users, Intrusion Detection, System Call (SC).

Full Text:

PDF

References


J. Jabez and B. Muthukumar” Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach” International Conference on Intelligent Computing, Communication & Convergence (ICCC-2015)

Rajni Tewatia, Asha Mishra” Introduction To Intrusion Detection System: Review “INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 4, ISSUE 05, MAY 2015.

Sapna S. Kaushik, Dr. Prof.P.R.Deshmukh” Detection of Attacks in an Intrusion Detection System” Sapna S Kaushik et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (3) , 2011, 982-986.

Lin Ying,Zhang Yan,Ou Yang-jia “The Design and implementation of Host-Based Intrusion Detection System” IEEE Conference Publications on Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium,pages Pages: 595 – 598,

https://www.giac.org/.../host-vs-network-based-intrusion-detection.../102...

Bace,Rebecca “An Introduction to Intrusion Detection &Assessment” Infidel Inc., prepared for ICSA Inc. Copyright 1998.

Dr. S.Sasidhar Babu, “ Secured SMS- A protocol for SMS security”, International Journal of Computer Engineering & Technology, Volume 5, Issue 12, December (2014), pp. 37-41

Zhenghua Xu , Xinghuo Yu , Yong Feng , Jiankun Hu , Zahir Tari , Fengling Han “A Multi-Module Anomaly Detection Scheme based on System Call Prediction” 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA).

J. Hu, X. Yu, D. Qiu, and H.-H. Chen, “A simple and efficient hidden markov model scheme for host-based anomaly intrusion detection,”Network Magazine of Global Internetworking, vol. 23, pp. 42–47, 2009.

L. Khan, M. Awad, and B. Thuraisingham, “A new intrusion detection system using support vector machines and hierarchical clustering,” The VLDB Journal, vol. 16, no. 4, pp. 507–521, 2007.

C. Warrender, S. Forrest, and B. Pearlmutter, “Detecting intrusions using system calls: Alternative data models,” in IEEE Symposium on Security and Privacy (S&P), 1999, pp. 133–145.

Fang-Yie Leu, Kun-Lin Tsai, Yi-Ting Hsiao, and Chao-Tung Yang “An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques” IEEE SYSTEMS JOURNAL

Irina Ioniţă, Liviu Ioniţă “An Agent-Based Approach for Building an Intrusion Detection System” Networking in Education and Research, 2013 RoEduNet International Conference 12th Edition , pages 1-6, 26-28 Sept. 2013 ,

I. M. Hegazy, T. Al-Arif, Z.T. Fayed, and H. M. Faheem, “A framework for multiagent-based system for intrusion detection”, in Proceedings of the 3rd International Conference on Intelligent Systems Design and Applications (ISDA'03), August 2003

I. M. Hegazy, H. M. Faheem, T. Al-Arif, and T. Ahmed, “Performance evaluation of agent-based IDS”, in Proceedings of the 2nd International Conference on Intelligent Computing and Information Systems (ICICIS 2005), p. 314 - 319, March 2005.

Mr. Ketan Sanjay Desale, Ms. Roshani Ade “Genetic Algorithm based Feature Selection Approach for Effective Intrusion Detection System” 2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015.

Wei Li, “Using Genetic Algorithm for Network Intrusion Detection”, Proceedings of the United States Department of Energy Cyber Security Grou, Training Conference, 2004, Vol. 8, pp. 24-27.

Mouaad KEZIH, Mahmoud TAIBI, “Evaluation Effectiveness of Intrusion Detection System with Reduced Dimension Using Data Mining Classification Tools”, 2nd International Conference on Systems and Computer Science (ICSCS) , August 26-27, 2013.

Wei Li “Using Genetic Algorithm for Network Intrusion Detection”. [20] V.Jyothsna,V.V.RamaPrasad” A Review of Anomaly based IntrusionDetectionSystems”.

I. M. Hegazy, H. M. Faheem, T. Al-Arif, and T. Ahmed, “Performance evaluation of agent-based IDS”, in Proceedings of the 2nd International Conference on Intelligent Computing and Information Systems (ICICIS 2005), p. 314 - 319, March 2005.

Mr. Ketan Sanjay Desale, Ms. Roshani Ade “Genetic Algorithm based Feature Selection Approach for Effective Intrusion Detection System” 2015 International Conference on Computer Communication and Informatics (ICCCI -2015), Jan. 08 – 10, 2015.

Wei Li, “Using Genetic Algorithm for Network Intrusion Detection”, Proceedings of the United States Department of Energy Cyber Security Grou, Training Conference, 2004, Vol. 8, pp. 24-27.

Mouaad KEZIH, Mahmoud TAIBI, “Evaluation Effectiveness of Intrusion Detection System with Reduced Dimension Using Data Mining Classification Tools”, 2nd International Conference on Systems and Computer Science (ICSCS) , August 26-27, 2013.

Wei Li “Using Genetic Algorithm for Network Intrusion Detection”.

V.Jyothsna,V.V.RamaPrasad” A Review of Anomaly based IntrusionDetectionSystems”. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727 PP 07-10 www.iosrjournals.org International Conference on Emerging Trends in Engineering & Management 10 |Page (ICETEM-2016)


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.