User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:4
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
来源
ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II | 2019年 / 956卷
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [11] Behavior-based botnet detection in parallel
    Wang, Kuochen
    Huang, Chun-Ying
    Tsai, Li-Yang
    Lin, Ying-Dar
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1849 - 1859
  • [12] Intrusion detection using text processing techniques with a kernel based similarity measure
    Sharma, Alok
    Pujari, Arun K.
    Paliwal, Kuldip K.
    COMPUTERS & SECURITY, 2007, 26 (7-8) : 488 - 495
  • [13] WiP: Behavior-based Service Change Detection
    Jahl, Alexander
    Huu Tam Tran
    Baraki, Harun
    Geihs, Kurt
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2018), 2018, : 267 - 269
  • [14] Statistical Based Intrusion Detection Framework using Six Sigma Technique
    Kumar, Sathish Alampalayam P.
    Kumar, Anup
    Srinivasan, S.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (10): : 333 - 342
  • [15] Probabilistic techniques for intrusion detection based on computer audit data
    Ye, N
    Li, XY
    Chen, Q
    Emran, SM
    Xu, MM
    IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2001, 31 (04): : 266 - 274
  • [16] A survey of intrusion detection techniques based on negative selection algorithm
    Singh, Kuldeep
    Kaur, Lakhwinder
    Maini, Raman
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (SUPPL 1) : 175 - 185
  • [17] Research of Outlier Mining Based Adaptive Intrusion Detection Techniques
    Ke, Fang Yu
    Yan, Fu
    Lin, Zhou Jun
    THIRD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING: WKDD 2010, PROCEEDINGS, 2010, : 552 - 555
  • [18] Intrusion detection using data mining techniques
    Reddy, YB
    Guha, R
    Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Vols 1and 2, 2004, : 26 - 30
  • [19] Isualization techniques for intrusion Behavior identification
    Erbacher, RF
    Garber, M
    PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 84 - 91
  • [20] Behavior-Based Anomaly Detection in Log Data of Physical Access Control Systems
    Skopik, Florian
    Wurzenberger, Markus
    Hoeld, Georg
    Landauer, Max
    Kuhn, Walter
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3158 - 3175