User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:3
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [41] Behavior-Based Malware Detection on Mobile Phone
    Dai, Shuaifu
    Liu, Yaxin
    Wang, Tielei
    Wei, Tao
    Zou, Wei
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [42] A Parameterless Learning Algorithm for Behavior-based Detection
    Wang, Can
    Feng, Yaokai
    Kawamoto, Junpei
    Hori, Yoshiaki
    Sakurai, Kouichi
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 11 - 18
  • [43] A Study on The behavior-based Malware Detection Signature
    Oh, Sungtaek
    Go, Woong
    Lee, Taejin
    ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, 2017, 2 : 663 - 670
  • [44] Behavior-based features model for malware detection
    Galal H.S.
    Mahdy Y.B.
    Atiea M.A.
    Journal of Computer Virology and Hacking Techniques, 2016, 12 (2) : 59 - 67
  • [45] InfoScape: A Browser for User Behavior-Based Information Retrieval System
    Kawata, Masaaki
    Ogawa, Katsuhiko
    HUMAN INTERFACE AND THE MANAGEMENT OF INFORMATION: DESIGNING INFORMATION ENVIRONMENTS, PT I, 2009, 5617 : 419 - +
  • [46] WiP: Behavior-based Service Change Detection
    Jahl, Alexander
    Huu Tam Tran
    Baraki, Harun
    Geihs, Kurt
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2018), 2018, : 267 - 269
  • [47] Behavior-based Worm Detection and Signature Generation
    Yao, Yu
    Lv, Junwei
    Gao, Fuxiang
    Zhang, Yanfang
    Yu, Ge
    2008 INTERNATIONAL MULTISYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS), 2008, : 124 - 131
  • [48] Automatic Functionality Detection in Behavior-Based IDS
    Nykodym, Tomas
    Skormin, Victor
    Dolgikh, Andrey
    Antonakos, James.
    2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 1302 - 1307
  • [49] User Behavior-based Spatial Charging Coordination of EV Fleet
    Li, Zhikang
    Alsabbagh, Amro
    Meng, Yi
    Ma, Chengbin
    IECON 2020: THE 46TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2020, : 3635 - 3640
  • [50] Statistical Based Intrusion Detection Framework using Six Sigma Technique
    Kumar, Sathish Alampalayam P.
    Kumar, Anup
    Srinivasan, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 333 - 342