An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

被引:27
|
作者
Leu, Fang-Yie [1 ,2 ]
Tsai, Kun-Lin [3 ]
Hsiao, Yi-Ting [4 ]
Yang, Chao-Tung [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
[2] Tunghai Univ, Dept Informat Management, Taichung 40704, Taiwan
[3] Tunghai Univ, Dept Elect Engn, Taichung 40704, Taiwan
[4] MiTAC Informat Technol Corp, Taipei 11493, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Data mining; insider attack; intrusion detection and protection; system call (SC); users' behaviors; LOG FILES;
D O I
10.1109/JSYST.2015.2418434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviors launched from the outside world of the system only. In addition, some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder's personal profile. The experimental results demonstrate that the IIDPS's user identification accuracy is 94.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently.
引用
收藏
页码:427 / 438
页数:12
相关论文
共 50 条
  • [21] Distributed Intrusion Detection System for Cloud Environments based on Data Mining techniques
    Idhammad, Mohamed
    Afdel, Karim
    Belouch, Mustapha
    PROCEEDINGS OF THE FIRST INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING IN DATA SCIENCES (ICDS2017), 2018, 127 : 35 - 41
  • [22] An Overview of Intrusion Detection Based on Data Mining Techniques
    Wankhade, Kapil
    Patka, Sadia
    Thool, Ravinrda
    2013 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2013), 2013, : 626 - 629
  • [23] Data mining for intrusion detection: Techniques, applications and systems
    Pei, H
    Upadhyaya, SJ
    Farooq, F
    Govindaraju, V
    20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, : 877 - 877
  • [24] Integrating data mining techniques with intrusion detection methods
    Mukkamala, R
    Gagnon, J
    Jajodia, S
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 33 - 46
  • [25] Intrusion Detection System using Stream Data Mining and Drift Detection Method
    Kumar, Manish
    Hanumanthappa, M.
    2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
  • [26] Intrusion detection system based on data mining
    Zhang, Jishan
    Gan, Yong
    Bian, Zhiwei
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 1214 - 1218
  • [27] Intrusion detection system based on data mining
    Zhan Jinhua
    FIRST INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2007, : 402 - 405
  • [28] Integrating Intrusion Detection System and Data Mining
    Yusufovna, Sattarova Feruza
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 256 - 259
  • [29] Intrusion Detection System using Fuzzy Logic and Data Mining Technique
    Chapke, Prajkta P.
    Deshmukh, Rupali R.
    ICARCSET'15: PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON ADVANCED RESEARCH IN COMPUTER SCIENCE ENGINEERING & TECHNOLOGY (ICARCSET - 2015), 2015,
  • [30] Intrusion Detection System by Using Hybrid Algorithm of Data Mining Technique
    Foroushani, Zohreh Abtahi
    Li, Yue
    PROCEEDINGS OF 2018 7TH INTERNATIONAL CONFERENCE ON SOFTWARE AND COMPUTER APPLICATIONS (ICSCA 2018), 2018, : 119 - 123