User Behavior-Based Intrusion Detection Using Statistical Techniques

被引:4
|
作者
Malek, Zakiyabanu S. [1 ]
Trivedi, Bhushan [1 ]
Shah, Axita [2 ]
机构
[1] Pacific Univ, Udaipur, Rajasthan, India
[2] Gujarat Univ, Dept Comp Sci, Rollwala Comp Ctr, Ahmadabad, Gujarat, India
来源
ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II | 2019年 / 956卷
关键词
Intrusion detection; Anomaly detection; Mean; Logistic Regression;
D O I
10.1007/978-981-13-3143-5_39
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.
引用
收藏
页码:480 / 489
页数:10
相关论文
共 50 条
  • [41] Intrusion Detection in SCADA systems using Machine Learning Techniques
    Maglaras, Leandros A.
    Jiang, Jianmin
    2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 626 - 631
  • [42] Behavior-based Anomaly Detection for Securing Smart Home Systems Automation
    Amraoui, Noureddine
    Zouari, Belhassen
    2020 28TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), 2020, : 373 - 378
  • [43] Security intrusion detection using quantum machine learning techniques
    Maxim Kalinin
    Vasiliy Krundyshev
    Journal of Computer Virology and Hacking Techniques, 2023, 19 : 125 - 136
  • [44] Intrusion Detection in Smart Grid Using Data Mining Techniques
    Subasi, Abdulhamit
    Al-Marwani, Khloud
    Alghamdi, Reem
    Kwairanga, Aisha
    Qaisar, Saeed M.
    Al-Nory, Malak
    Rambo, Khulood A.
    2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
  • [45] Intrusion Detection Using Text Processing Techniques with a Binary-Weighted Gosine Metric
    Rawat, Sanjay
    Gulati, V. P.
    Pujari, Arun K.
    Vemuri, V. Rao
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (01): : 44 - 51
  • [46] Anomaly based Intrusion Detection using Modified Fuzzy Clustering
    Harish, B. S.
    Kumar, S. V. Aruna
    INTERNATIONAL JOURNAL OF INTERACTIVE MULTIMEDIA AND ARTIFICIAL INTELLIGENCE, 2017, 4 (06): : 54 - 59
  • [47] Security intrusion detection using quantum machine learning techniques
    Kalinin, Maxim
    Krundyshev, Vasiliy
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2023, 19 (01) : 125 - 136
  • [48] Using Classification Techniques for Creation of Predictive Intrusion Detection Model
    Almutairi, Abdulrazaq
    Parish, David
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 223 - 228
  • [49] Analysis on intrusion detection system using machine learning techniques
    Seraphim B.I.
    Poovammal E.
    Lecture Notes on Data Engineering and Communications Technologies, 2021, 66 : 423 - 441
  • [50] Research on Intrusion Detection Algorithm of User Data based on Cloud Computing
    Zhang Hongdong
    Song Yuli
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 275 - 283