doi: 10.17706/jsw.10.9.1111-1118
Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques
Abstract—Many organizations face the critical threat of inside attacks from masqueraders who can be either disgruntled employees or external hackers by exploit legitimate user identity to manipulate the system. Intrusion detection systems (IDSs) are deployed to build the normal user profiles and then detect the possible deviation from the past behavior patterns indicating a possible illegal access. In this paper, we apply a profiling method based on user command sequences and apply the data mining technique Naïve Bayes classification to measure the degree of deviation. A fuzzy system is applied to integrate multiple commands execution to evaluate the overall threat of the possible masquerader existence.
Index Terms—Anomaly intrusion detection, data mining, soft computing, computer security.
Cite: Yingbing Yu, "Intrusion Detection of Masqueraders Based On Data Mining and Soft Computing Techniques," Journal of Software vol. 10, no. 9, pp. 1111-1118, 2015.
General Information
ISSN: 1796-217X (Online)
Abbreviated Title: J. Softw.
Frequency: Quarterly
APC: 500USD
DOI: 10.17706/JSW
Editor-in-Chief: Prof. Antanas Verikas
Executive Editor: Ms. Cecilia Xie
Abstracting/ Indexing: DBLP, EBSCO,
CNKI, Google Scholar, ProQuest,
INSPEC(IET), ULRICH's Periodicals
Directory, WorldCat, etcE-mail: jsweditorialoffice@gmail.com
-
Jun 12, 2024 News!
Vol 19, No 2 has been published with online version [Click]
-
Jan 04, 2024 News!
JSW will adopt Article-by-Article Work Flow
-
Apr 01, 2024 News!
Vol 14, No 4- Vol 14, No 12 has been indexed by IET-(Inspec) [Click]
-
Apr 01, 2024 News!
Papers published in JSW Vol 18, No 1- Vol 18, No 6 have been indexed by DBLP [Click]
-
Mar 01, 2024 News!
Vol 19, No 1 has been published with online version [Click]