Skip to main content

User Behavior-Based Intrusion Detection Using Statistical Techniques

  • Conference paper
  • First Online:
Book cover Advanced Informatics for Computing Research (ICAICR 2018)

Abstract

The objective of intrusion detection systems is to identify attacks on host or networks based computer systems. IDS also categorise based on attacks, if attacks pattern are known then signature-based intrusion detection method is used or if abnormal behavior then anomaly (behavior) based intrusion detection method is used. We have retrieved various user behavior parameters such as resource access and usage, count of input devices such as a keyboard and mouse access. The focus of this paper is to identify whether user behavior is normal or abnormal on host-based GUI systems using statistical techniques. We apply simple Aggregation measure and Logistic Regression methods on user behavior log. Based on our implementation, Evaluation show significance accuracy in the training set to result in confusion matrix using Logistic Regression method.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Denning, D.: An intrusion detection model. IEEE Trans. Softw. Eng. 13(2), 222–232 (1987)

    Article  Google Scholar 

  2. Wafa, S.A., Naoum, R.: Development of genetic-based machine learning for network intrusion detection. World Acad. Sci. Eng. Technol. 55, 20–24 (2009)

    Google Scholar 

  3. Gerken, M.: Statistical-Based Intrusion Detection. http://www.sei.cmu.edu/str/descriptions/sbid.html. August 2007

  4. Axelsson, S.: Intrusion detection systems: a taxonomy and survey, Department of Computer Engineering, Chalmers University of Technology, Sweden, Technical report 99–15 March 2000

    Google Scholar 

  5. Umphress, D., Williams, G.: Identity verification through keyboard characteristics. Int. J. Man Mach. Stud. 23(3), 263–273 (1985)

    Article  Google Scholar 

  6. Anderson, J.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington (1980)

    Google Scholar 

  7. Lunt, T.F.: Real-time intrusion detection. In: COMPCON Spring 1989 34th IEEE Computer Society International Conference: Intellectual Leverage, Digest of Papers, pp. 348–353. IEEE Press, Washington (1989)

    Google Scholar 

  8. Smaha, S.E.: Haystack: an intrusion detection system. In: 4th ACSAC, pp. 37–44. IEEE Press, Washington (1988)

    Google Scholar 

  9. Balajinath, B., Raghavan, S.V.: Intrusion detection through learning behavior model. Comput. Commun. 24(12), 1202–1212 (2001)

    Article  Google Scholar 

  10. Gunetti, D., Ruffo, G.: Intrusion detection through behavioral data. In: Hand, D.J., Kok, J.N., Berthold, M.R. (eds.) IDA 1999. LNCS, vol. 1642, pp. 383–394. Springer, Heidelberg (1999). https://doi.org/10.1007/3-540-48412-4_32

    Chapter  Google Scholar 

  11. Tan, K.: The application of neural networks to UNIX computer security. In: Proceedings IEEE International Conference on Neural Networks, vol. 1, pp. 476–481. IEEE Press, Washington (1995)

    Google Scholar 

  12. Gu, G., Cardenas, A.A., Lee, K.: Principled reasoning and practical applications of alert fusion in intrusion detection systems. In: 2008 Proceedings ASIACCS, pp. 136–147. ACM, New York (2008)

    Google Scholar 

  13. Shavlik, J., Shavlik, M.: Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage. In: Proceedings 10th ACM SIGKDD, pp. 276–285. ACM, New York (2004)

    Google Scholar 

  14. Pusara, M., Brodley, C.E.: User re-authentication via mouse movements. In: ACM Workshop on Visualization and Data Mining for Computer Security, pp. 1–8. ACM, New York (2004)

    Google Scholar 

  15. Bergadano, F., Gunetti, D., Picardi, C.: Identity verification through dynamic keystroke analysis. Intell. Data Anal. 7(5), 469–496 (2003)

    Article  Google Scholar 

  16. Vizer, L.M., Zhou, L., Sears, A.: Automated stress detection using keystroke and linguistic features: an exploratory study. IJHCS 67(10), 870–886 (2009)

    Google Scholar 

  17. Om, H., Hazra, T.: Statistical techniques in anomaly intrusion detection system. Int. J. Adv. Eng. Technol. 5(1), 387–398 (2012). ISSN: 2231-1963

    Google Scholar 

  18. Debar, H., Dacier, M., Wespi, A.: A revised taxonomy for intrusion-detection systems. Ann. Des Télécommun. 55(7–8), 361–378 (2000)

    Google Scholar 

  19. García-Teodoro, P., Díaz-Verdejo, J., Maciá-Fernández, G., Vázquez, E.: Anomaly-based network intrusion detection: techniques, systems and challenges. Comput. Secur. 28(1–2), 18–28 (2009)

    Article  Google Scholar 

  20. Anderson, D., Frivold, T., Tamaru, A., Valdes, A., Release, B.: Next Generation Intrusion Detection Expert System (NIDES), software users manual., http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.26.5048. Accessed 19 February 2016

  21. Qayyum, A., Islam, M.H., Jamil, M.: Taxonomy of statistical based anomaly detection techniques for intrusion detection. In: Proceedings of the IEEE Symposium on Emerging Technologies, pp. 270–276 (2005)

    Google Scholar 

  22. Jyothsna, V.V.R.P.V., Prasad, V.R., Prasad, K.M.: A review of anomaly based intrusion detection systems. Int. J. Comput. Appl., 28(7), 26–35 (2011)

    Article  Google Scholar 

  23. Ashfaq, A.B., Javed, M., Khayam, S.A., Radha, H.: An Information-theoretic combining method for multi-classifier anomaly detection systems. In: IEEE International Conference on Communications, pp. 1–5 (2010)

    Google Scholar 

  24. Mok, M.S., Sohn, S.Y., Ju, Y.H.: Random effects logistic regression model for anomaly detection. Expert Syst. Appl. 37 7162–7166 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zakiyabanu S. Malek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malek, Z.S., Trivedi, B., Shah, A. (2019). User Behavior-Based Intrusion Detection Using Statistical Techniques. In: Luhach, A., Singh, D., Hsiung, PA., Hawari, K., Lingras, P., Singh, P. (eds) Advanced Informatics for Computing Research. ICAICR 2018. Communications in Computer and Information Science, vol 956. Springer, Singapore. https://doi.org/10.1007/978-981-13-3143-5_39

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3143-5_39

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3142-8

  • Online ISBN: 978-981-13-3143-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics