Implementation of Log Mining and Forensic Analysis for Database Intrusion Detection and Protection System

Authors(1) :-Swati Baburao Wankar

Most PC systems utilize user IDs and passwords as the login examples to validate users. Be that as it may, numerous individuals share their login designs with colleagues and demand these collaborators to help co-errands, accordingly making the example as one of the weakest purposes of PC security. Insider attackers, the legitimate users of a system who assault the system internally, are difficult to distinguish since most intrusion detection systems and firewalls identify and disconnect pernicious practices propelled from the outside universe of the system as it were. Accordingly, in this undertaking, a security system, named the Internal Intrusion Detection and Protection System (IIDPS), is proposed to distinguish insider assaults at IMAGE PATTERN BASED SIGNATURE GENERATION by utilizing data mining and legal techniques. This system checks user conduct profile and picture design at that point play out the activity.

Authors and Affiliations

Swati Baburao Wankar
M.Tech Scholar, Department of Computer Science &Engineering, Wainganga College of Engineering & Technology, Nagpur, Maharashtra, India

IIDPS, System Calls, Forensic Techniques, Computer Security, User Behavior Profile, Image Pattern Based Signature Generation

  1. S. Gajek, A. Sadeghi, C. Stuble, and M. Winandy, “Compartmented security for browsers—Or how to thwart a phisher with trusted computing,” in Proc. IEEE Int. Conf. Avail., Rel. Security, Vienna, Austria, Apr. 2007, pp. 120–127.
  2. C. Yue and H. Wang, “BogusBiter: A transparent protection against phishing attacks,” ACM Trans. Int. Technol., vol. 10, no. 2, pp. 1–31, May 2010.
  3. Q. Chen, S. Abdelwahed, and A. Erradi, “A model-based approach to self-protection in computing system,” in Proc. ACM Cloud Autonomic Comput. Conf., Miami, FL, USA, 2013, pp. 1–10.
  4. F. Y. Leu, M. C. Li, J. C. Lin, and C. T. Yang, “Detection workload in a dynamic grid-based intrusion detection environment,” J. Parallel Distrib. Comput., vol. 68, no. 4, pp. 427–442, Apr. 2008.
  5. H. Lu, B. Zhao, X. Wang, and J. Su, “DiffSig: Resource differentiation based malware behavioral concise signature generation,” Inf. Commun. Technol., vol. 7804, pp. 271–284, 2013.
  6. Z. Shan, X. Wang, T. Chiueh, and X. Meng, “Safe side effects commitment for OS-level virtualization,” in Proc. ACM Int. Conf. Autonomic Comput., Karlsruhe, Germany, 2011, pp. 111–120.
  7. M. K. Rogers and K. Seigfried, “The future of computer forensics: A needs analysis survey,” Comput. Security, vol. 23, no. 1, pp.12–16, Feb. 2004.
  8. J. Choi, C. Choi, B. Ko, D. Choi, and P. Kim, “Detecting web based DDoS attack using MapReduce operations in cloud computing environment,” J. Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 28–37, Nov. 2013.
  9. Q. Wang, L. Vu, K. Nahrstedt, and H. Khurana, “MIS: Malicious nodes identification scheme in network-coding-based peer-to-peer streaming,” in Proc. IEEE INFOCOM, San Diego, CA, USA, 2010, pp. 1–5.
  10. Z. A. Baig, “Pattern recognition for detecting distributed node exhaustion attacks in wireless sensor networks,” Comput. Commun., vol. 34, no. 3, pp. 468–484, Mar. 2011.
  11. H. S. Kang and S. R. Kim, “A new logging-based IP traceback approach using data mining techniques,” J. Internet Serv. Inf. Security, vol. 3, no. 3/4, pp. 72–80, Nov. 2013.
  12. K. A. Garcia, R. Monroy, L. A. Trejo, and C. Mex-Perera, “Analyzing log files for postmortem intrusion detection,” IEEE Trans. Syst., Man, Cybern., Part C: Appl. Rev., vol. 42, no. 6, pp. 1690–1704, Nov. 2012.
  13. M. A. Qadeer, M. Zahid, A. Iqbal, and M. R. Siddiqui, “Network traffic analysis and intrusion detection using packet sniffer,” in Proc. Int. Conf. Commun. Softw. Netw., Singapore, 2010, pp. 313–317.
  14. S. O’Shaughnessy and G. Gray, “Development and evaluation of a data set generator tool for generating synthetic log files containing computer attack signatures,” Int. J. Ambient Comput. Intell., vol. 3, no. 2, pp. 64–76, Apr. 2011.
  15. S. X. Wu and W. Banzhaf, “The use of computational intelligence in intrusion detection systems: A review,” Appl. Soft Comput., vol. 10, no. 1, pp. 1–35, Jan. 2010.

Publication Details

Published in : Volume 4 | Issue 8 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 627-631
Manuscript Number : IJSRSET1848167
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Swati Baburao Wankar, " Implementation of Log Mining and Forensic Analysis for Database Intrusion Detection and Protection System, International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 4, Issue 8, pp.627-631, May-June-2018.
Journal URL : http://ijsrset.com/IJSRSET1848167

Follow Us

Contact Us