This paper is published in Volume-4, Issue-1, 2018
Area
Data Mining
Author
Chaitali Choure , Leena H. Patil
Org/Univ
Priyadarshini Institute of Engineering and Technology, Nagpur, Maharashtra, India
Keywords
Forensic Features, Identify user, Data Mining, Internal Intrusion Detection and Protection, System call(sc).
Citations
IEEE
Chaitali Choure , Leena H. Patil. A Literature Survey on Intrusion Detection and Protection System using Data Mining, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Chaitali Choure , Leena H. Patil (2018). A Literature Survey on Intrusion Detection and Protection System using Data Mining. International Journal of Advance Research, Ideas and Innovations in Technology, 4(1) www.IJARIIT.com.
MLA
Chaitali Choure , Leena H. Patil. "A Literature Survey on Intrusion Detection and Protection System using Data Mining." International Journal of Advance Research, Ideas and Innovations in Technology 4.1 (2018). www.IJARIIT.com.
Chaitali Choure , Leena H. Patil. A Literature Survey on Intrusion Detection and Protection System using Data Mining, International Journal of Advance Research, Ideas and Innovations in Technology, www.IJARIIT.com.
APA
Chaitali Choure , Leena H. Patil (2018). A Literature Survey on Intrusion Detection and Protection System using Data Mining. International Journal of Advance Research, Ideas and Innovations in Technology, 4(1) www.IJARIIT.com.
MLA
Chaitali Choure , Leena H. Patil. "A Literature Survey on Intrusion Detection and Protection System using Data Mining." International Journal of Advance Research, Ideas and Innovations in Technology 4.1 (2018). www.IJARIIT.com.
Abstract
In the modern world of security many researchers have proposed various new approaches; among those techniques application of data mining for Intrusion detection is one of the best suitable approaches.The system proposes a security system, name the Intrusion Detection and Protection System (IDPS) at system call level, which creates the personal profile for the user to keep track of user usage habits as the forensic features.
The IDP uses a local computational grid to detect malicious behavior in a real-time manner. In this paper, a security system, named the IDPS is proposed to detect insider attacker at SC level by using data mining and forensic techniques.