An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

被引:27
|
作者
Leu, Fang-Yie [1 ,2 ]
Tsai, Kun-Lin [3 ]
Hsiao, Yi-Ting [4 ]
Yang, Chao-Tung [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
[2] Tunghai Univ, Dept Informat Management, Taichung 40704, Taiwan
[3] Tunghai Univ, Dept Elect Engn, Taichung 40704, Taiwan
[4] MiTAC Informat Technol Corp, Taipei 11493, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Data mining; insider attack; intrusion detection and protection; system call (SC); users' behaviors; LOG FILES;
D O I
10.1109/JSYST.2015.2418434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviors launched from the outside world of the system only. In addition, some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder's personal profile. The experimental results demonstrate that the IIDPS's user identification accuracy is 94.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently.
引用
收藏
页码:427 / 438
页数:12
相关论文
共 50 条
  • [1] Intrusion detection and identification system using data mining and forensic techniques
    Len, Fang-Yie
    Hu, Kai-Wei
    Jiang, Fuu-Cheng
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 137 - +
  • [2] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [3] Intelligent Network Intrusion Detection System using Data Mining Techniques
    Sultana, Amreen
    Jabbar, M. A.
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2016, : 329 - 333
  • [4] Network Intrusion Detection System Using various data mining techniques
    DikshantGupta
    SuhaniSinghal
    Malik, Shamita
    Singh, Archana
    2016 INTERNATIONAL CONFERENCE ON RESEARCH ADVANCES IN INTEGRATED NAVIGATION SYSTEMS (RAINS), 2016,
  • [5] Combination of Data Mining Techniques for Intrusion Detection System
    Elekar, Kailas Shivshankar
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [6] Data Mining Techniques for Intrusion Detection and Prevention System
    Chalak, Ashok
    Harale, Naresh D.
    Bhosale, Rohini
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (08): : 200 - 203
  • [7] Classification of Intrusion Detection Using Data Mining Techniques
    Sahani, Roma
    Shatabdinalini
    Rout, Chinmayee
    Badajena, J. Chandrakanta
    Jena, Ajay Kumar
    Das, Himansu
    PROGRESS IN COMPUTING, ANALYTICS AND NETWORKING, ICCAN 2017, 2018, 710 : 753 - 764
  • [8] Effective approach toward Intrusion Detection System using data mining techniques
    Nadiammai, G. V.
    Hemalatha, M.
    EGYPTIAN INFORMATICS JOURNAL, 2014, 15 (01) : 37 - 50
  • [9] A host-based real-time intrusion detection system with data mining and forensic techniques
    Leu, FY
    Yang, TY
    37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 580 - 586
  • [10] AN INTELLIGENT NETWORK INTRUSION DETECTION USING DATA MINING TECHNIQUES
    Shukran, Mohd Afizi Mohd
    Maskat, Kamaruzaman
    JURNAL TEKNOLOGI, 2015, 76 (12): : 127 - 131