Open Access Journal

ISSN : 2394 - 6849 (Online)

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

Open Access Journal

International Journal of Engineering Research in Electronics and Communication Engineering(IJERECE)

Monthly Journal for Electronics and Communication Engineering

ISSN : 2394-6849 (Online)

Security System for Internal Attackers Using Data Mining and Forensic Techniques

Author : Ashwini 1 Dr. D Geetha 2

Date of Publication :7th May 2016

Abstract: In the current time most boomed technology is network based technology. Based on the current study in network based technology and improved determination on this technology require guarantee dependable process of network based systems. as huge amount of information are saved and transfer from one point to another point while transferring the information it is prone to the attacks so security of the client is an important issue. This paper analysis advanced explanation for the issue of insiders assault can find appear in the PC security research literature. In the stage of network based technology, Security is an main problem. As there is the unbelievable raise in the resource and information sharing, the need for security is also raises Intrusion detection system is designed, which monitors the doubtful activity, misuse, unauthorized access etc. Based on the survey on intrusion detection system provides two techniques they are data mining and forensic techniques for finding internal attackers present in system and we also propose two algorithms to overcome inside attack.

Reference :

  1. [1] Fang-Yie Leu, Kun-Lin Tsai, Member, IEEE, Yi-Ting Hsiao, and Chao-Tung Yang," An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques", IEEE system journal 2015.

    [2] Shikha Agrawal, Jitendra Agrawal, " Survey on Anomaly Detection using Data Mining stored in different Techniques", Procedia Computer Science vol. 60, pp. 708 – 713, Aug. 2015.

    [3] J.S. Shanthini and S. Rajalakshmi, " Data Mining Technique for Efficient Intrusion Detection System: A Survey ",International Journal On Engineering Technology and Sciences (IJETS) Vol. 2, Issue 6, pp. 2349-3968, Nov. 2015.

    [4] Sonam Chourse and Vineet Richhariya, " Survey Paper on Intrusion Detection using Data Mining Techniques", International Journal of Emerging Technology and Advanced Engineering (IJETAE) Vol. 4, Issue 8, pp. 2250- 2459, Aug 2014.

    [5] Nadiammai G. V., Hemalathain M.,"Effective approach toward Intrusion Detection System using data mining techniques", Cairo University, Elsevier, Egyptian Informatics Journal, 2014, pp. 37-50.

    [6] Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh, James B D Joshi, " A Similarity based Technique for Detecting Malicious Executable files for Computer Forensics ", IEEE 2006.

    [7] Z. B. Hu, J. Su, and V. P. Shirochin “An intelligent lightweight intrusion detection system with forensics technique,” in Proc. IEEE Workshop Intell. Data Acquisition Adv. Comput. Syst.: Technol. Appl., Dortmund,Germany, 2007, pp. 647–651.

    [8] Jonathon T. Giffin, Somesh Jha, and Barton P. Miller"Automated Discovery of Mimicry Attacks"

    [9] Kaur N.. " Survey paper on Data Mining Technique of Intrusion Detection ", International Journal of Science. Engineering and Technology Research, vol.2, Issue 4, pp. 799-804, 2013.

    [10] Tang D. H., Cao Z.," Machine Learning - based Intrusion Detection Algorithm", Journal of Computational Information Systems, vol. 5, Issue 6, pp 1825-1831, 2009.

    [11] Vaishali B Kosamkar and Sangita S Chaudhari, “Data Mining Algorithms for Intrusion Detection System: An Overview ", International Conference in Recent Trends in Information Technology and Computer Science (ICRTITCS), 2012.

    [12] E. Mays, F.J. Damerau, R.L. Mercer. Context-based spelling correction. In information Proceeding and Management, 27(5):517-522, 1991.

    [13] Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore, " Tools and Techniques for Network Forensic ", International Journal of Network Security & Its Applications (IJNSA), Vol .1, No.1,April 2009.


Recent Article