High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

Internal Intrusion Detection System

Author(s):

Komal S Gaikwad , AISSMS Polytechnic Pune-01; Harsha Satish Bhujbal, AISSMS Polytechnic Pune

Keywords:

Data Mining, Internal Intrusion Detection and Protection System (IIDPS)

Abstract

Currently, most laptop systems use user IDs and passwords because the login patterns to manifest users. However, many folks share their login patterns with co-workers and request these co-workers to help co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviours launched from the skin world of the system solely. In addition, some studies claimed that analysing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users’ personal profiles to keep track of users’ usage habits as their forensic features and determines whether a valid login user is the account holder or not by scrutiny his/her current laptop usage behaviours with the patterns collected within the account holder’s personal profile. The experimental results demonstrate that the IIDPS’s user identification accuracy is ninety four.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently.

Other Details

Paper ID: IJSRDV7I10647
Published in: Volume : 7, Issue : 1
Publication Date: 01/04/2019
Page(s): 1408-1410

Article Preview

Download Article