An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

被引:27
作者
Leu, Fang-Yie [1 ,2 ]
Tsai, Kun-Lin [3 ]
Hsiao, Yi-Ting [4 ]
Yang, Chao-Tung [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci, Taichung 40704, Taiwan
[2] Tunghai Univ, Dept Informat Management, Taichung 40704, Taiwan
[3] Tunghai Univ, Dept Elect Engn, Taichung 40704, Taiwan
[4] MiTAC Informat Technol Corp, Taipei 11493, Taiwan
来源
IEEE SYSTEMS JOURNAL | 2017年 / 11卷 / 02期
关键词
Data mining; insider attack; intrusion detection and protection; system call (SC); users' behaviors; LOG FILES;
D O I
10.1109/JSYST.2015.2418434
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since most intrusion detection systems and firewalls identify and isolate malicious behaviors launched from the outside world of the system only. In addition, some studies claimed that analyzing system calls (SCs) generated by commands can identify these commands, with which to accurately detect attacks, and attack patterns are the features of an attack. Therefore, in this paper, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The IIDPS creates users' personal profiles to keep track of users' usage habits as their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder's personal profile. The experimental results demonstrate that the IIDPS's user identification accuracy is 94.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently.
引用
收藏
页码:427 / 438
页数:12
相关论文
共 32 条
  • [1] Amdahl GM, 1967, P APR 18 20 1967 SPR, P1
  • [2] Angin P., 2013, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, V4, P1
  • [3] [Anonymous], IEEE SYST J
  • [4] [Anonymous], P 5 INT WORKSH MAN I
  • [5] Arseni S. C., 2014, P INT C COMM BUCH RO, P1
  • [6] Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks
    Baig, Z. A.
    [J]. COMPUTER COMMUNICATIONS, 2011, 34 (03) : 468 - 484
  • [7] Bohm-Mader J., 2013, WEBSPHERE MQ UNIX AD
  • [8] Fuzzy importance-performance analysis of visitor satisfaction for theme park: the case of Fantawild Adventure in Taiwan, China
    Cheng, Qian
    Guo, Jingjing
    Ling, Supei
    [J]. CURRENT ISSUES IN TOURISM, 2016, 19 (09) : 895 - 912
  • [9] Choi J., 2013, J. Internet Serv. Inf. Secur, V3, P28
  • [10] Dengya Zhu, 2011, 2011 Seventh International Conference on Semantics Knowledge and Grid, P83, DOI 10.1109/SKG.2011.44