ADVANCED INTRUSION DETECTION AND PROTECTION SYSTEM
Keywords:
Intrusion Detection Systems, Digital Forensic, Logs, CryptographyAbstract
Now a day’s lot of the users use ids and passwords as login pattern for the authenticate users. However
making patterns is weakest point of computer security as so many user share the login pattern with the co-workers for the
completed co-task, inside attacker is attacked internally and it will be valid attacker of system, As using intrusion
detection systems and firewalls identify and isolate harmful behaviors generated from the outside world we can find out
internal attacker of the system only. In some of the studied define examine that system calls generated by some
commands and these command help to find detect accurate attack s, and attack patterns are the features of an attack.
However in the paper security System defines as the Internal Intrusion Detection and Protection System (IIDPS), is help
to detect internally attack s by using data mining and forensic technique at SC level. For the track the information of
users usages the IIDPS creates users’ personal profiles as their forensic features and investigate that the valid login user
is account holder an login or not by comparing his/her current computer usage behaviors with the patterns collected in
the account holder’s personal profile. The experimental results demonstrate that the IIDPS’s user identification accuracy
is 94.29%, whereas the response time is less than 0.45s, implying that it can prevent a protected system from insider
attack s effectively and efficiently.