An Encroachment Detection and Protection Using Data Mining and Forensic Techniques
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.7, No. 6)Publication Date: 2018-06-30
Authors : Shamna.P; Unnikrishnan S Kumar;
Page : 121-134
Keywords : Data mining; insider attack; encroachment detection and protection; system call (SC); users’ behaviors;
Abstract
User IDs and passwords are the main login patterns used by the computer systems for the authentication purpose. By sharing the passwords with a third party there will exists a security issue. Internal encroachment is hard to detect. Because most encroachment detection systems and firewalls identify and isolate malicious behaviors launched from the outside world of the system only. To accurately detect the attacks, we have to analyze the system calls (SC) generated by commands. Here we propose a security system to detect insider attacks at SC level with the help of data mining and forensic techniques. The security system is named as Encroachment Detection and Protection System (EDPS). The EDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder's personal profile. The EDPS prevents a system from insider attacks with an identification accuracy of 94.29% and response time is less than 0.45 s.
Other Latest Articles
- LITERATURE REVIEW ON LEADERSHIP, LEADERSHIP THEORIES, STYLE AND LEADERSHIP DEVELOPMENT
- CHALLENGES BEFORE SOCIAL SECURITY & WELFARE CODE, 2017
- NEWSPAPER READING HABITS OF COLLEGE STUDENTS: A CASE STUDY OF RRS COLLEGE OF ENGINEERING AND TECHNOLOGY, HYDERABAD
- MAN’S ENDLESS STRUGGLE FOR SURVIVAL AND IDENTITY AS PORTRAYED IN RUPA BAJWA’S NOVEL ‘THE SARI SHOP’
Last modified: 2018-06-29 15:37:23