User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:4
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
来源
ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II | 2019年 / 956卷
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [21] Improving User Trust on Deep Neural Networks based Intrusion Detection Systems
    Amarasinghe, Kasun
    Manic, Milos
    IECON 2018 - 44TH ANNUAL CONFERENCE OF THE IEEE INDUSTRIAL ELECTRONICS SOCIETY, 2018, : 3262 - 3268
  • [22] IT Intrusion Detection Using Statistical Learning and Testbed Measurements
    Wang, Xiaoxuan
    Stadler, Rolf
    PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [23] Anomaly-based network intrusion detection: Techniques, systems and challenges
    Garcia-Teodoro, P.
    Diaz-Verdejo, J.
    Macia-Fernandez, G.
    Vazquez, E.
    COMPUTERS & SECURITY, 2009, 28 (1-2) : 18 - 28
  • [24] Cloud-Based Intrusion Detection Approach Using Machine Learning Techniques
    Attou, Hanaa
    Guezzaz, Azidine
    Benkirane, Said
    Azrour, Mourade
    Farhaoui, Yousef
    BIG DATA MINING AND ANALYTICS, 2023, 6 (03) : 311 - 320
  • [25] Intrusion detection using classification techniques: a comparative study
    Bouteraa, Imad
    Derdour, Makhlouf
    Ahmim, Ahmed
    INTERNATIONAL JOURNAL OF DATA MINING MODELLING AND MANAGEMENT, 2020, 12 (01) : 65 - 86
  • [26] Intrusion Detection Systems in MANETs using Hybrid Techniques
    Joshi, Vaishnavi Bheemarao
    Goudar, R. H.
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON SMART TECHNOLOGIES FOR SMART NATION (SMARTTECHCON), 2017, : 534 - 538
  • [27] Fuzzy approach for intrusion detection based on user's commands
    Kudlacik, Przemyslaw
    Porwik, Piotr
    Wesolowski, Tomasz
    SOFT COMPUTING, 2016, 20 (07) : 2705 - 2719
  • [28] Fuzzy approach for intrusion detection based on user’s commands
    Przemysław Kudłacik
    Piotr Porwik
    Tomasz Wesołowski
    Soft Computing, 2016, 20 : 2705 - 2719
  • [29] Intrusion Detection Techniques for Mobile Wireless Networks
    Yongguang Zhang
    Wenke Lee
    Yi-An Huang
    Wireless Networks, 2003, 9 : 545 - 556
  • [30] Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection
    Totel, Eric
    Hkimi, Mouna
    Hurfin, Michel
    Leslous, Mourad
    Labiche, Yvan
    2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016), 2016, : 53 - 64