Intrusion detection and identification system using data mining and forensic techniques

被引:0
作者
Len, Fang-Yie [1 ]
Hu, Kai-Wei [1 ]
Jiang, Fuu-Cheng [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci & Informat Engn, Taichung, Taiwan
来源
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS | 2007年 / 4752卷
关键词
forensic features; intrusion detection; data mining; identifying users;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Presently, most computers authenticate a user's ID and password before the user can log in. However, if the two items are known to hackers, there is a risk of security breach. In this paper, we propose a system, named the Intrusion Detection and Identification System (IDIS), which builds a profile for each user in an intranet to keep track of his/her usage habits as forensic features. In this way the IDIS can identify who the underlying user in the intranet is by comparing the user's current inputs with the features collected in the profiles established for all users. User habits are extracted from their usage histories by using data mining techniques. When an attack is discovered, the IDIS switches the user's inputs to a honey pot not only to isolate the user from the underlying system, but also to collect many more attack features by using the honey pot to enrich attack patterns which will improve performance of future detection. Our experimental results show that the recognition accuracy of students in the computer science department of our university is nearly 99.16% since they are sophisticated users. The recognition accuracy of those other than computer science students is 94.43%.
引用
收藏
页码:137 / +
页数:3
相关论文
共 21 条
[1]  
ABDULLAH K, 2005, IEEE WORKSH INF ASS
[2]   Fake finger detection by skin distortion analysis [J].
Antonelli, Athos ;
Cappelli, Raffaele ;
Maio, Dario ;
Maltoni, Davide .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2006, 1 (03) :360-373
[3]  
Cabrera JBD, 2001, SIGMOD REC, V30, P25, DOI 10.1145/604264.604269
[4]  
CHAU M, 2002, NAT C DIG GOV RES, P271
[5]  
DICKERSON JE, 2000, INT C N AM SOC FUZZ, P301
[6]  
DRIDI F, 2004, INT C SYST SCI, P1
[7]  
KRASNJAK D, 2005, INT S IM SIGN PROC A
[8]  
LEU FY, 2005, INT COMP SOFTW APPL
[9]  
LEUSKI A, 2001, ACM CIKM 01 NOV, P33
[10]  
LU K, 2003, IEEE ELECT COMPUTER, P789