User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:4
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
来源
ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II | 2019年 / 956卷
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [1] Behavior-Based Intrusion Detection in Encrypted Environments
    Koch, Robert
    Golling, Mario
    Rodosek, Gabi Dreo
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (07) : 124 - 131
  • [2] A Behavior-based Intrusion Detection Technique for Smart Grid Infrastructure
    Kwon, YooJin
    Kim, Huy Kang
    Lim, Yong Hun
    Lim, Jong In
    2015 IEEE EINDHOVEN POWERTECH, 2015,
  • [3] Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods
    Kwon, Hee-Yong
    Kim, Taesic
    Lee, Mun-Kyu
    ELECTRONICS, 2022, 11 (06)
  • [4] Taxonomy of statistical based anomaly detection techniques for intrusion detection
    Qayyum, A
    Islam, MH
    Jamil, M
    IEEE: 2005 International Conference on Emerging Technologies, Proceedings, 2005, : 270 - 276
  • [5] A framework for behavior-based detection of user substitution in a mobile context
    Mazhelis, Oleksiy
    Puuronen, Seppo
    COMPUTERS & SECURITY, 2007, 26 (02) : 154 - 176
  • [6] User behavior Pattern-Signature based Intrusion Detection
    Malek, Zakiyabanu S.
    Trivedi, Bhushan
    Shah, Axita
    PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020), 2020, : 549 - 552
  • [7] Poster: VULCAN - Repurposing Accessibility Features for Behavior-based Intrusion Detection Dataset Generation
    van Sloun, Christian
    Wehrle, Klaus
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 3543 - 3545
  • [8] An anomaly intrusion detection method by clustering normal user behavior
    Oh, SH
    Lee, WS
    COMPUTERS & SECURITY, 2003, 22 (07) : 596 - 612
  • [9] Ensuring patient safety in IoMT: A systematic literature review of behavior-based intrusion detection systems
    Domenech, Jordi
    Martin-Faus, Isabel V.
    Mhiri, Saber
    Pegueroles, Josep
    INTERNET OF THINGS, 2024, 28
  • [10] Intrusion Detection System based on Hybrid Classifier and User Profile Enhancement Techniques
    Pokharel, Prabhat
    Pokhrel, Roshan
    Sigdel, Sandeep
    2020 5TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2020), 2020, : 141 - 147