An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

被引:27
|
作者
Leu, Fang-Yie [1 ,2 ]
Tsai, Kun-Lin [3 ]
Hsiao, Yi-Ting [4 ]
Yang, Chao-Tung [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
[2] Tunghai Univ, Dept Informat Management, Taichung 40704, Taiwan
[3] Tunghai Univ, Dept Elect Engn, Taichung 40704, Taiwan
[4] MiTAC Informat Technol Corp, Taipei 11493, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Data mining; insider attack; intrusion detection and protection; system call (SC); users' behaviors; LOG FILES;
D O I
10.1109/JSYST.2015.2418434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviors launched from the outside world of the system only. In addition, some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder's personal profile. The experimental results demonstrate that the IIDPS's user identification accuracy is 94.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently.
引用
收藏
页码:427 / 438
页数:12
相关论文
共 50 条
  • [41] A Distributed Intrusion Detection System with Protection from an Internal Intruder
    Shterenberg, S. I.
    Poltavtseva, M. A.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2018, 52 (08) : 945 - 953
  • [42] A real-time intrusion detection system using data mining technique
    Leu, Fang-Yie
    Hu, Kai-Wei
    INT CONF ON CYBERNETICS AND INFORMATION TECHNOLOGIES, SYSTEMS AND APPLICATIONS/INT CONF ON COMPUTING, COMMUNICATIONS AND CONTROL TECHNOLOGIES, VOL II, 2007, : 148 - 153
  • [43] Efficient Intrusion Detection System using Stream Data Mining Classification Technique
    Desale, Ketan Sanjay
    Kumathekar, Chandrakant Namdev
    Chavan, Arjun Pramod
    1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015, 2015, : 469 - 473
  • [44] Using Data Mining Algorithms for Developing a Model for Intrusion Detection System (IDS)
    Duque, Solane
    bin Omar, Mohd Nizam
    COMPLEX ADAPTIVE SYSTEMS, 2015, 2015, 61 : 46 - 51
  • [45] Hybrid intelligent intrusion Detection/Prevention System using fuzzylogic and data mining
    Shanmugam, Bharanidharan
    Idris, Norbik Bashah
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 237 - 244
  • [46] A Novel Intrusion Detection System by using Intelligent Data Mining in Weka Environment
    Mohammad, Muamer N.
    Sulaiman, Norrozila
    Muhsin, Osama Abdulkarim
    WORLD CONFERENCE ON INFORMATION TECHNOLOGY (WCIT-2010), 2011, 3
  • [47] A Novel Rule-based Intrusion Detection System Using Data Mining
    Li, Lei
    Yang, De-Zhang
    Shen, Fang-Cheng
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 6, 2010, : 169 - 172
  • [48] Developing a Hybrid Intrusion Detection System Using Data Mining for Power Systems
    Pan, Shengyi
    Morris, Thomas
    Adhikari, Uttam
    IEEE TRANSACTIONS ON SMART GRID, 2015, 6 (06) : 3104 - 3113
  • [49] Efficient Classification Mechanism for Network Intrusion Detection System Based on Data Mining Techniques: a Survey
    Subaira, A. S.
    Scholar, P. G.
    Anitha, P.
    2014 IEEE 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO), 2014, : 274 - 280
  • [50] Data mining for intrusion detection
    Liu, DH
    Wang, HZ
    Wang, XM
    2001 INTERNATIONAL CONFERENCES ON INFO-TECH AND INFO-NET PROCEEDINGS, CONFERENCE A-G: INFO-TECH & INFO-NET: A KEY TO BETTER LIFE, 2001, : E7 - E12