Skip to Main Content
ASME Press Select Proceedings

International Conference on Mechanical Engineering and Technology (ICMET-London 2011)

Editor
Garry Lee
Garry Lee
Information Engineering Research Institute
Search for other works by this author on:
ISBN:
9780791859896
No. of Pages:
906
Publisher:
ASME Press
Publication date:
2011

Host based intrusion detection has emerged as an important approach to safeguard the system from unauthorized users. It detects possible attacks on a system, on which the intrusion detection system runs. In this paper we have proposed a model capable of distinguishing an authorized user from an unauthorized one by studying the pattern of usage of the system, even after compromising the basic authentication protocol i.e. username and password. Our model of intrusion detection uses different aspects of data mining and probability theory. The proposed model deals with the analysis of system log files; data mining concepts are applied to extract the behavior pattern of the user and probability theory is used to predict the authorized user. The average success rate is above 94% for a system which has rich history files.

This content is only available via PDF.
Close Modal
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close Modal
Close Modal