A Technical Survey on Internal Intrusion Detection and Protection System Using Data Mining and Forensics Techniques

Authors

  • Swati Baburao Wankar  M.Tech Scholar, Department of Computer Science &Engineering, Wainganga College of Engineering & Technology, Nagpur, Maharashtra, India

Keywords:

Data Mining, Insider Attack, Intrusion Detection and Protection, System Call (SC), Users’ Behaviors, Functionality, Identify User, Attacker Profile.

Abstract

There are distinctive approaches to ensure the data and also the systems from attackers. Firewalls are utilized to secure passwords according to require. Commonly these are insufficient. Because of that systems and systems are constantly under the perception of string. Intrusion detection system (IDS) distinguishes undesirable exercises of PC system, which are gets through the web. The control may take type of assaults by programmers. Yet, it is watched that most firewalls and IDS ordinarily attempt to secure PC system against outcast assaults. This paper centers overview around various data mining and legal techniques to distinguish and shield internal PC system from intrusion utilizing Internal Intrusion Detection and protection system Using Data Mining and Forensic Techniques(IIDPS) to discover insider assaults at SC level with the assistance of Data mining and Forensic Technique.

References

  1. Fang-YieLeu, Kun-Lin Tsai, Yi-Ting Hsiao, and Chao-Tung Yang,’’ An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques”, IEEE Int. Conf. Avail., Rel. Security, Taiwan,pp 1932-8184,2015
  2. S. Gajek, A. Sadeghi, C. Stuble, and M. Winandy, “Compartmented security for browsers—Or how to thwart a phisher with trusted computing,” in Proc. IEEE Int. Conf. Avail., Rel. Security, Vienna, Austria, Apr. 2007,pp. 120–127.
  3. B. Sayed, I. Traore, I. Woungang, and M. S. Obaidat, “Biometric authentication using mouse gesture dynamics,” IEEE Syst. J., vol. 7, no. 2,pp. 262–274, Jun. 2013.
  4. S. C. Arseni, E. C. Popovici, L. A. Stancu, O. G. Guta, and S. V. Halunga,“Securing an alerting subsystem for a keystroke-based user identification system,” in Proc. Int. Conf. Commun., Bucharest, Romania, 2014,pp. 1–4.
  5. M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, “Data-stream based intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study,” IEEE Syst. J., vol. 9, no. 1, pp. 1–14, Jan. 2014.
  6. K. A. Garcia, R. Monroy, L. A. Trejo, and C. Mex-Perera, “Analyzing log files for postmortem intrusion detection,” IEEE Trans. Syst., Man,Cybern., Part C: Appl. Rev., vol. 42, no. 6, pp. 1690–1704, Nov. 2012.
  7. M. A. Qadeer, M. Zahid, A. Iqbal, and M. R. Siddiqui, “Network traffic analysis and intrusion detection using packet sniffer,” in Proc. Int. Conf. Commun. Softw. Netw., Singapore, 2010, pp. 313–317.
  8. S. Yu, K. Sood, and Y. Xiang, “An effective and feasible traceback scheme in mobile internet environment,” IEEE Commun. Lett., vol. 18, no. 11,pp. 1911–1914, Nov. 2014.
  9. AIDE. [Online]. Available: http://aide.sourceforge.net/
  10. SAMHAIN. [Online]. Available: http://www.la-samhna.de/samhain/
  11. Symantec CSP. [Online]. Available: http://www.symantec.com/criticalsystem-protection.

Downloads

Published

2018-06-30

Issue

Section

Research Articles

How to Cite

[1]
Swati Baburao Wankar, " A Technical Survey on Internal Intrusion Detection and Protection System Using Data Mining and Forensics Techniques, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 4, Issue 8, pp.591-593, May-June-2018.