Privacy Protection System for Secure Authentication and Internal Intrusion Detection System

Chandan Tiwary, Mr. Sunil Rathod


The system proposes a security system, named the Internal Intrusion Detection and Protection System (IIDPS) at system call level, which creates personal profiles for users to keep track of their usage habits as the forensic features. The IIDPS uses a local computational grid to detect malicious behaviors in a real-time manner. The number of hacking and intrusion incidents is increasing alarmingly each year as new technology rolls out. The system designed Intrusion Detection System (IDS) that implements predefined algorithms for identifying the attacks over a network. Therefore, in this project, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to detect insider attacks at SC level by using data mining and forensic techniques. The system can identify a users forensic features by analyzing the corresponding SCs to enhance the accuracy of attack detection, and able to port the IIDPS to a parallel system to further shorten its detection response time.

Full Text:



Fang-Yie Leu, Kun-Lin Tsai, Member, IEEE, Yi-Ting Hsiao, and ChaoTung

Yang, Intrusion detection and identification system using data

mining and forensic techniques, Adv. Inf. Comput. Security, vol. 4752,

pp. 137152, 2015.

B. Sayed, I. Traore, I. Woungang, and M. S. Obaidat, Biometric authentication

using mouse gesture dynamics, IEEE Syst. J., vol. 7, no. 2, pp.

, Jun. 2013.

Z. Shan, X. Wang, T. Chiueh, and X. Meng, Safe side effects commitment

for OS-level virtualization, in Proc. ACM Int. Conf. Autonomic Comput.,

Karlsruhe, Germany, 2011, pp. 111120.

H. S. Kang and S. R. Kim, A new logging-based IP traceback approach

using data mining techniques, J. Internet Serv. Inf. Security, vol. 3, no.

/4, pp. 7280, Nov. 2013.

J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, Detecting web based DDoS

attack using MapReduce operations in cloud computing environment, J.

Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 2837, Nov. 2013

Shui Yu, Senior Member, IEEE, Keshav Sood, and Yong Xiang, Senior

Member, IEEE,An Effective and Feasible Traceback Scheme in Mobile


NO. 11, NOVEMBER2014.

Qian Chen ,Sherif Abdelwahed,A Model-based Approach to SelfProtection

in SCADA Systems,In 2011.

Cormac Herley and Dinei Florencio Microsoft Research, Redmond,How

To Login From an Internet Cafe Without Worrying About Keyloggers,2014.


Copyright © IJETT, International Journal on Emerging Trends in Technology