This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License
|
||||||||
|
Paper Details
Paper Title
A Survey on Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques
Authors
  M.Murugesan,  M.Saranya
Abstract
In recent decades the computer use login ID and credentials scheme to validate handlers. Sharing of credentials between co users in a company is unavoidable at certain cases which in turn becomes the vulnerable ideas of processor security. Insider attackers are the authorized users, who attack the system internally. The firewalls and IDS protect the system from external attackers only. The user’s personal profile is created by IIDPS to preserve path of user’s habits. These systems call checks user behavior profile, then detect for attackers. However, the IIDPS system only detects the attacker and do not perform any actions to deny the service. The System architecture of improved IIDPS provides high security performance by investigating third-party shell commands and analyzes the details of command and provide security code which is send to authorized user in wireless network using GSM.
Keywords- Data mining, insider attack, system calls (SCs), user’s behaviors, and intrusion detection.
Publication Details
Unique Identification Number - IJEDR1701099Page Number(s) - 639-641Pubished in - Volume 5 | Issue 1 | March 2017DOI (Digital Object Identifier) -    Publisher - IJEDR (ISSN - 2321-9939)
Cite this Article
  M.Murugesan,  M.Saranya,   "A Survey on Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques", International Journal of Engineering Development and Research (IJEDR), ISSN:2321-9939, Volume.5, Issue 1, pp.639-641, March 2017, Available at :http://www.ijedr.org/papers/IJEDR1701099.pdf
Article Preview
|
|
||||||
|