User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:3
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [1] Behavior-Based Intrusion Detection in Encrypted Environments
    Koch, Robert
    Golling, Mario
    Rodosek, Gabi Dreo
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (07) : 124 - 131
  • [2] Behavior-based intrusion detection in mobile phone systems
    Boukerche, A
    Notare, MSMA
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2002, 62 (09) : 1476 - 1490
  • [3] Improving malware detection response time with behavior-based statistical analysis techniques
    Prelipcean, Dumitru Bogdan
    Popescu, Adrian Stefan
    Gavrilut, Dragos Teodor
    2015 17TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC), 2016, : 232 - 239
  • [4] A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure
    Kwon, YooJin
    Kim, Huy Kang
    Lim, Yong Hun
    Lim, Jong In
    2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [5] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [6] Taxonomy of statistical based anomaly detection techniques for intrusion detection
    Qayyum, A
    Islam, MH
    Jamil, M
    IEEE: 2005 International Conference on Emerging Technologies, Proceedings, 2005, : 270 - 276
  • [7] A framework for behavior-based detection of user substitution in a mobile context
    Mazhelis, Oleksiy
    Puuronen, Seppo
    COMPUTERS & SECURITY, 2007, 26 (02) : 154 - 176
  • [8] GUI-Based User Behavior Intrusion Detection
    Malek, Zakiya
    Trivedi, Bhushan
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 2050 - 2055
  • [9] Database intrusion detection using role and user behavior based risk assessment
    Singh, Indu
    Kumar, Narendra
    Srinivasa, K. G.
    Sharma, Tript
    Kumar, Vaibhav
    Singhal, Siddharth
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 55
  • [10] User behavior Pattern-Signature based Intrusion Detection
    Malek, Zakiyabanu S.
    Trivedi, Bhushan
    Shah, Axita
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 549 - 552