Intrusion threat detection from insider attack using learning behavior-based

In recent years, intrusion prevention system (IPS) had been developed as a new approach system to defend networking systems, which properly combines the firewall technique with the intrusion detection. When an attack is identified, intrusion prevention immediately blocks and logs the offending data....

Full description

Saved in:
Bibliographic Details
Main Authors: Stiawan, Deris, Idris, Mohd. Yazid, Salam, Md. Sah, Abdullah, Abdul Hanan
Format: Article
Published: Academic Journals 2012
Subjects:
Online Access:http://eprints.utm.my/id/eprint/30572/
https://academicjournals.org/journal/IJPS/article-abstract/2EAEF2116344
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
id my.utm.30572
record_format eprints
spelling my.utm.305722019-07-23T09:01:39Z http://eprints.utm.my/id/eprint/30572/ Intrusion threat detection from insider attack using learning behavior-based Stiawan, Deris Idris, Mohd. Yazid Salam, Md. Sah Abdullah, Abdul Hanan QA75 Electronic computers. Computer science In recent years, intrusion prevention system (IPS) had been developed as a new approach system to defend networking systems, which properly combines the firewall technique with the intrusion detection. When an attack is identified, intrusion prevention immediately blocks and logs the offending data. The primary IPS uses signature to identify activities in network traffic and the host will perform detection on inbound – outbound packets and would block that activity before the damage happens or the access is reached to the network resources. Signature is the primary factor in intrusion prevention, to identify something and then stopping it must be through the distinct characteristics. In this paper, we propose Behavior - based prevention to trigger mechanism and analyze correlation outbound traffic from inside user. We describe the habitual activity from outbound traffic, which is normal activity, suspicious threat or malicious threat uses traffic assessment. This paper also describes an algorithm for the complexity of the suspicious response. Academic Journals 2012-01-23 Article PeerReviewed Stiawan, Deris and Idris, Mohd. Yazid and Salam, Md. Sah and Abdullah, Abdul Hanan (2012) Intrusion threat detection from insider attack using learning behavior-based. International Journal of the Physical Sciences, 7 (4). pp. 624-637. ISSN 1992-1950 https://academicjournals.org/journal/IJPS/article-abstract/2EAEF2116344 DOI: 10.5897/IJPS11.1381
institution Universiti Teknologi Malaysia
building UTM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Malaysia
content_source UTM Institutional Repository
url_provider http://eprints.utm.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Stiawan, Deris
Idris, Mohd. Yazid
Salam, Md. Sah
Abdullah, Abdul Hanan
Intrusion threat detection from insider attack using learning behavior-based
description In recent years, intrusion prevention system (IPS) had been developed as a new approach system to defend networking systems, which properly combines the firewall technique with the intrusion detection. When an attack is identified, intrusion prevention immediately blocks and logs the offending data. The primary IPS uses signature to identify activities in network traffic and the host will perform detection on inbound – outbound packets and would block that activity before the damage happens or the access is reached to the network resources. Signature is the primary factor in intrusion prevention, to identify something and then stopping it must be through the distinct characteristics. In this paper, we propose Behavior - based prevention to trigger mechanism and analyze correlation outbound traffic from inside user. We describe the habitual activity from outbound traffic, which is normal activity, suspicious threat or malicious threat uses traffic assessment. This paper also describes an algorithm for the complexity of the suspicious response.
format Article
author Stiawan, Deris
Idris, Mohd. Yazid
Salam, Md. Sah
Abdullah, Abdul Hanan
author_facet Stiawan, Deris
Idris, Mohd. Yazid
Salam, Md. Sah
Abdullah, Abdul Hanan
author_sort Stiawan, Deris
title Intrusion threat detection from insider attack using learning behavior-based
title_short Intrusion threat detection from insider attack using learning behavior-based
title_full Intrusion threat detection from insider attack using learning behavior-based
title_fullStr Intrusion threat detection from insider attack using learning behavior-based
title_full_unstemmed Intrusion threat detection from insider attack using learning behavior-based
title_sort intrusion threat detection from insider attack using learning behavior-based
publisher Academic Journals
publishDate 2012
url http://eprints.utm.my/id/eprint/30572/
https://academicjournals.org/journal/IJPS/article-abstract/2EAEF2116344
_version_ 1643648581655068672