User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:4
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
来源
ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II | 2019年 / 956卷
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [31] Analysis of anomaly-based intrusion detection techniques for mobile wireless networks
    Liu, Lijun
    Ma, Hongxia
    Liu, Jianqiu
    Li, Zhuowei
    2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 2, 2008, : 827 - 832
  • [32] Intrusion detection techniques for mobile wireless networks
    Zhang, YG
    Lee, WK
    Huang, YA
    WIRELESS NETWORKS, 2003, 9 (05) : 545 - 556
  • [33] Intrusion detection techniques in cloud environment: A survey
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 77 : 18 - 47
  • [34] A Review on Intrusion Detection Techniques and Intrusion Detection systems in MANETS
    Chakravarthi, S. Sreenivasa
    Veluru, Suresh
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 730 - 737
  • [35] Online Internet Intrusion Detection Based on Flow Statistical Characteristics
    Gu, Chengjie
    Zhang, Shunyi
    Lu, Hanhua
    KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT, 2011, 7091 : 160 - 170
  • [36] User profiling in intrusion detection: A review
    Peng, Jian
    Choo, Kim-Kwang Raymond
    Ashman, Helen
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 72 : 14 - 27
  • [37] Intrusion detection techniques and approaches
    Verwoerd, T
    Hunt, R
    COMPUTER COMMUNICATIONS, 2002, 25 (15) : 1356 - 1365
  • [38] Statistical Process Control-Based Intrusion Detection and Monitoring
    Park, Yongro
    Baek, Seung Hyun
    Kim, Seong-Hee
    Tsui, Kwok-Leung
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2014, 30 (02) : 257 - 273
  • [39] Heuristic Intrusion Detection Based on Traffic Flow Statistical Analysis
    Szczepanik, Wojciech
    Niemiec, Marcin
    ENERGIES, 2022, 15 (11)
  • [40] An anomaly detection model of user behavior based on similarity clustering
    Hu, Shuai
    Xiao, Zhihua
    Rao, Qiang
    Liao, Rongtao
    PROCEEDINGS OF 2018 IEEE 4TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2018), 2018, : 835 - 838