User behavior Pattern -Signature based Intrusion Detection
Title | User behavior Pattern -Signature based Intrusion Detection |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Malek, Z. S., Trivedi, B., Shah, A. |
Conference Name | 2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4) |
Date Published | July 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-6823-4 |
Keywords | authentic user, biometric applications, biometrics (access control), Computational modeling, Computer hacking, computer network security, computer system, digital signatures, Engines, expert system, expert systems, extensive system, host-based IDS monitors user behavior, Human Behavior, Intrusion detection, intrusion detection system, Intrusion Detection using Statistics, main concerned area, particular procedure, Pattern Based Intrusion Detection, pattern recognized engine, PIDE model, pubcrawl, resilience, Resiliency, SBID model, Scalability, security, Statistical Based Intrusion Detection, user authentication, user behavior Pattern -signature, user suspicious behavior |
Abstract | Technology advancement also increases the risk of a computer's security. As we can have various mechanisms to ensure safety but still there have flaws. The main concerned area is user authentication. For authentication, various biometric applications are used but once authentication is done in the begging there was no guarantee that the computer system is used by the authentic user or not. The intrusion detection system (IDS) is a particular procedure that is used to identify intruders by analyzing user behavior in the system after the user logged in. Host-based IDS monitors user behavior in the computer and identify user suspicious behavior as an intrusion or normal behavior. This paper discusses how an expert system detects intrusions using a set of rules as a pattern recognized engine. We propose a PIDE (Pattern Based Intrusion Detection) model, which is verified previously implemented SBID (Statistical Based Intrusion Detection) model. Experiment results indicate that integration of SBID and PBID approach provides an extensive system to detect intrusion. |
URL | https://ieeexplore.ieee.org/document/9210368 |
DOI | 10.1109/WorldS450073.2020.9210368 |
Citation Key | malek_user_2020 |
- Intrusion Detection using Statistics
- user suspicious behavior
- user behavior Pattern -signature
- user authentication
- Statistical Based Intrusion Detection
- security
- Scalability
- SBID model
- Resiliency
- resilience
- pubcrawl
- PIDE model
- pattern recognized engine
- Pattern Based Intrusion Detection
- particular procedure
- main concerned area
- authentic user
- intrusion detection system
- Intrusion Detection
- Human behavior
- host-based IDS monitors user behavior
- extensive system
- expert systems
- expert system
- Engines
- digital signatures
- computer system
- computer network security
- Computer hacking
- Computational modeling
- biometrics (access control)
- biometric applications