UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 4 | April 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 7 Issue 2
February-2020
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2002262


Registration ID:
227997

Page Number

406-409

Share This Article


Jetir RMS

Title

AN INTRUSION DETECTION AND PROTECTION SYSTEM BY USING DATA MINING FORENSIC TECHNIQUE

Abstract

Currently, most PC frameworks use client IDs and passwords as the login examples to verify clients. Be that as it may, numerous individuals share their login designs with collaborators and demand these colleagues to help co-assignments, consequently making the example as one of the weakest purposes of PC security. Insider assailants, the legitimate clients of a framework who assault the framework inside, are difficult to recognize since most interruption location frameworks and firewalls distinguish and segregate pernicious practices propelled from the outside universe of the framework as it were. Moreover, a few investigations asserted that breaking down framework calls (SCs) produced by directions can recognize these directions, with which to precisely distinguish assaults, and assault designs are the highlights of an assault. In this way, a security framework, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to identify insider assaults at SC level by utilizing information mining and scientific procedures. The IIDPS makes clients' close to home profiles to monitor clients' utilization propensity. As their forensic features and determines whether a valid login user is the account holder or not by comparing his/her current computer usage behaviours with the patterns collected in the account holder’s personal profile.

Key Words

Data mining, insider attack, intrusion detection and protection, system call (SC), users' behaviours.

Cite This Article

"AN INTRUSION DETECTION AND PROTECTION SYSTEM BY USING DATA MINING FORENSIC TECHNIQUE", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.7, Issue 2, page no.406-409, February-2020, Available :http://www.jetir.org/papers/JETIR2002262.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"AN INTRUSION DETECTION AND PROTECTION SYSTEM BY USING DATA MINING FORENSIC TECHNIQUE", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.7, Issue 2, page no. pp406-409, February-2020, Available at : http://www.jetir.org/papers/JETIR2002262.pdf

Publication Details

Published Paper ID: JETIR2002262
Registration ID: 227997
Published In: Volume 7 | Issue 2 | Year February-2020
DOI (Digital Object Identifier):
Page No: 406-409
Country: -, -, - .
Area: Engineering
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

0002980

Print This Page

Current Call For Paper

Jetir RMS