Visible to the public User behavior Pattern -Signature based Intrusion Detection

TitleUser behavior Pattern -Signature based Intrusion Detection
Publication TypeConference Paper
Year of Publication2020
AuthorsMalek, Z. S., Trivedi, B., Shah, A.
Conference Name2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4)
Date PublishedJuly 2020
PublisherIEEE
ISBN Number978-1-7281-6823-4
Keywordsauthentic user, biometric applications, biometrics (access control), Computational modeling, Computer hacking, computer network security, computer system, digital signatures, Engines, expert system, expert systems, extensive system, host-based IDS monitors user behavior, Human Behavior, Intrusion detection, intrusion detection system, Intrusion Detection using Statistics, main concerned area, particular procedure, Pattern Based Intrusion Detection, pattern recognized engine, PIDE model, pubcrawl, resilience, Resiliency, SBID model, Scalability, security, Statistical Based Intrusion Detection, user authentication, user behavior Pattern -signature, user suspicious behavior
Abstract

Technology advancement also increases the risk of a computer's security. As we can have various mechanisms to ensure safety but still there have flaws. The main concerned area is user authentication. For authentication, various biometric applications are used but once authentication is done in the begging there was no guarantee that the computer system is used by the authentic user or not. The intrusion detection system (IDS) is a particular procedure that is used to identify intruders by analyzing user behavior in the system after the user logged in. Host-based IDS monitors user behavior in the computer and identify user suspicious behavior as an intrusion or normal behavior. This paper discusses how an expert system detects intrusions using a set of rules as a pattern recognized engine. We propose a PIDE (Pattern Based Intrusion Detection) model, which is verified previously implemented SBID (Statistical Based Intrusion Detection) model. Experiment results indicate that integration of SBID and PBID approach provides an extensive system to detect intrusion.

URLhttps://ieeexplore.ieee.org/document/9210368
DOI10.1109/WorldS450073.2020.9210368
Citation Keymalek_user_2020