User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:3
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [31] Behavior-based botnet detection in parallel
    Wang, Kuochen
    Huang, Chun-Ying
    Tsai, Li-Yang
    Lin, Ying-Dar
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1849 - 1859
  • [32] Behavior-Based Detection of GPU Cryptojacking
    Tanana, Dmitry
    arXiv,
  • [33] A Novel Behavior-based Tracking Attack for User Identification
    Gu, Xiaodan
    Yang, Ming
    Fei, Jiaxuan
    Ling, Zhen
    Luo, Junzhou
    2015 THIRD INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA, 2015, : 227 - 233
  • [34] BBAC: Behavior-based access control to detect user suspicious behavior
    Rikhtechi, Leila
    Rafeh, Vahid
    Rezakhani, Afshin
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 43 (06) : 8207 - 8220
  • [35] Intramural Network Intrusion Detection by Monitoring User Behavior
    Zeng, Na
    Zhang, Xiaolong
    Zhang, Hong
    2009 SECOND INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING: KAM 2009, VOL 3, 2009, : 178 - 181
  • [36] A new intrusion detection system based on using non-linear statistical analysis and features selection techniques
    Al-Bakaa, Aliaa
    Al-Musawi, Bahaa
    COMPUTERS & SECURITY, 2022, 122
  • [37] Behavior-based Authentication using User Biological Data to IoT Device having Touchscreen
    Lee, Jiwoo
    Park, SoHyeon
    Lee, Eun-Kyu
    12TH INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2021): BEYOND THE PANDEMIC ERA WITH ICT CONVERGENCE INNOVATION, 2021, : 750 - 752
  • [38] An Android Behavior-Based Malware Detection Method using Machine Learning
    Chang, Wei-Ling
    Sun, Hung-Min
    Wu, Wei
    2016 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATIONS AND COMPUTING (ICSPCC), 2016,
  • [39] Behavioral Modeling Intrusion Detection System (BMIDS) using Internet of Things (IoT) Behavior-based Anomaly Detection via Immunity-inspired Algorithms
    Arrignton, Briana
    Barnett, LiEsa
    Rufus, Rahmira
    Esterline, Albert
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [40] Statistical Evaluation of Network Packets in an Intrusion Detection Mechanism Using ML and DL Techniques
    Raju, K. Srujan
    Singh, Manmohan
    Subburaj, T.
    Mahajan, Rashima
    Victoria, D. Rosy Salomi
    Ramkumar, R.
    Fahamitha, J.
    CYBERNETICS AND SYSTEMS, 2023,