Abstract

Network security plays a vital role in the prevention of data transmission network from the unauthorized access and illegal activities performed by the malicious users. Various security mechanisms include encryption and decryption, password protection, firewalls, anti-malware applications, Intrusion Detection Systems etc. Even though, these mechanisms prevents the network from security attacks, they fail to identify the internal attackers. The internal attackers causes equivalent damage as the external attackers. As the internal attackers imitate the authorized users, it is tedious to identify those attackers. In order to address the abovementioned issues, this paper proposes an Internal Attack Identification and Inhibition System (IAIIS) by combining the data mining and forensic techniques. The System Call (SC) of the users at the kernel are analyzed in the proposed IDS. The Cosine Similarity (CS) is applied to compare the profiles of the users to find, whether the user is a normal user or an abnormal user. The experimental results evaluate the proposed system in terms of detection accuracy, decisive rate threshold, response time, abnormal user count, and false alarm rate.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.