Host Based Automated Digital Forensic Technique with Intrusion Detection Systems

  • M R Aher University of Pune
  • L P Jadhav
  • V B Jadhav
  • D S Yewale
Keywords: Data Mining, Insider attack, intrusion, detection, protection, system call, users behaviors

Abstract

Now a day’s lot of the users use ids and password as login pattern for the authenticate users. However making patterns is weakest point of computer security as so many user share the login pattern with the co-workers for the completed co-task, inside attacker is attacked internally and it will be valid attacker of system, As using intrusion detection systems and firewalls identify and isolate harmful behaviors generated from the outside world we can find out internal attacker of the system only. In some of the studied define examine that system calls generated by some commands and these command help to find detect accurate attacks, and attack patterns are the features of an attack. However in the paper security System define as the Internal Intrusion Detection and Protection System (IIDPS), is help to detect internally attacks by using data mining and forensic technique at SC level. For the track the information of users usages the IIDPS creates users’ personal profiles as their forensic features and investigate that the valid login user is account holder can login or not by comparing his/her current computer usage behaviors with the patterns collected in the account holder’s personal profile. The experimental results demonstrate that the IIDPS’s user identification accuracy is 94.29%, whereas the response time is less than 0.45 s, implying that it can prevent a protected system from insider attacks effectively and efficiently.

References

[1] S. Gajek, A. Sadeghi, C. Stuble, and M. Winandy, ―Compartmented security for browsers—Or how to thwart a phisher with trusted computing,‖ in Proc. IEEE Int. Conf. Avail., Rel. Security, Vienna, Austria, Apr. 2007, pp. 120–127. [2] C. Yue and H. Wang, ―BogusBiter: A transparent protection against phishing attacks,‖ ACM Trans. Int. Technol., vol. 10, no. 2, pp. 1–31, May 2010. [3] Q. Chen, S. Abdelwahed, and A. Erradi, ―A model-based approach to self-protection in computing system,‖ in Proc. ACM Cloud Autonomic Comput. Conf., Miami, FL, USA, 2013, pp. 1–10. [4] F. Y. Leu, M. C. Li, J. C. Lin, and C. T. Yang, ―Detection workload in a dynamic grid-based intrusion detection environment,‖ J. Parallel Distrib. Computer. vol. 68, no. 4, pp. 427–442, Apr. 2008. [5] H. Lu, B. Zhao, X. Wang, and J. Su, ―DiffSig: Resource differentiation based malware behavioral concise signature generation,‖ Inf. Commun. Technol., vol. 7804, pp. 271–284, 2013. [6] Z. Shan, X. Wang, T. Chiueh, and X. Meng, ―Safe side effects commitment for OS-level virtualization,‖ in Proc. ACM Int. Conf. Autonomic Comput., Karlsruhe, Germany, 2011, pp. 111–120. [7] M. K. Rogers and K. Seigfried, ―The future of computer forensics: A needs analysis survey,‖ Computer. Security, vol. 23, no. 1, pp.12–16, Feb. 2004. [8] J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, ―Detecting web based DDoS attack using MapReduce operations in cloud computing environment,‖ J. Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 28–37, Nov. 2013. [9] Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, ―MIS: Malicious nodes identification scheme in network-coding
based peer-to-peer streaming,‖ in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1–5. [10] Z. A. Baig, ―Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks,‖ Computer. Commun., vol. 34, no. 3, pp. 468– 484, Mar. 2011. [11] H. S. Kang and S. R. Kim, ―A new logging-based IP traceback approach using data mining techniques,‖ J. Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 72–80, Nov. 2013. [12] K. A. Garcia, R. Monroy, L. A. Trejo, and C. Mex-Perera, ―Analyzing log files for postmortem intrusion detection,‖ IEEE Trans. Syst., Man, Cybern., Part C: Appl. Rev., vol. 42, no. 6, pp. 1690–1704, Nov. 2012. [13] M. A. Qadeer, M. Zahid, A. Iqbal, and M. R. Siddiqui, ―Network traffic analysis and intrusion detection using packet sniffer,‖ in Proc. Int. Conf. Commun. Softw. Netw., Singapore, 2010, pp. 313–317. [14] S. O’Shaughnessy and G. Gray, ―Development and evaluation of a data set generator tool for generating synthetic log files containing computer attack signatures,‖ Int. J. Ambient Comput. Intell., vol. 3, no. 2, pp. 64–76, Apr. 2011. [15] S. X. Wu and W. Banzhaf, ―The use of computational intelligence in intrusion detection systems: A review,‖ Appl. Soft Computer., vol. 10, no. 1, pp. 1–35, Jan. 2010. [16] F. Y. Leu, K.W. Hu, and F. C. Jiang ―Intrusion detection and identification system using data mining and forensic techniques,‖ Adv. Inf. Computer. Security, vol. 4752, pp. 137–152, 2007. [17] Z. B. Hu, J. Su, and V. P. Shirochin ―An intelligent lightweight intrusion detection system with forensics technique,‖ in Proc. IEEE Workshop Intell. Data Acquisition Adv. Computer. Syst.: Technol. Appl., Dortmund, Germany, 2007, pp. 647–651. [18] J. T. Giffin, S. Jha, and B. P. Miller, ―Automated discovery of mimicry attacks,‖ Recent Adv. Intrusion Detection, vol. 4219, pp. 41–60, Sep. 2006. [19] U. Fiore, F. Palmieri, A. Castiglione, and A. D. Santis, ―Network anomaly detection with the restricted Boltzmann machine,‖ Neurocomputing, vol. 122, pp. 13– 23, Dec. 2013. [20] M. A. Faisal, Z. Aung, J. R. Williams, and A. Sanchez, ―Data-streambased intrusion detection system for advanced metering infrastructure in smart grid: A feasibility study,‖ IEEE Syst. J., vol. 9, no. 1, pp. 1–14, Jan. 2014.
Published
2018-03-22
How to Cite
Aher, M., Jadhav, L., Jadhav, V., & Yewale, D. (2018). Host Based Automated Digital Forensic Technique with Intrusion Detection Systems. Asian Journal For Convergence In Technology (AJCT) ISSN -2350-1146, 3(3). Retrieved from http://www.asianssr.org/index.php/ajct/article/view/144
Section
Article

Most read articles by the same author(s)

Obs.: This plugin requires at least one statistics/report plugin to be enabled. If your statistics plugins provide more than one metric then please also select a main metric on the admin's site settings page and/or on the journal manager's settings pages.