A Real-Time Intrusion Detection System using Data Mining Technique

Presently, most computers authenticate user ID and password before users can login these systems. However, danger soon comes if the two items are known to hackers. In this paper, we propose a system, named Intrusion Detection and Identification System (IDIS), which builds a profile for each user in...

Full description

Bibliographic Details
Main Authors: Fang-Yie Leu, Kai-Wei Hu
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2008-04-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/T171GTB.pdf
Description
Summary:Presently, most computers authenticate user ID and password before users can login these systems. However, danger soon comes if the two items are known to hackers. In this paper, we propose a system, named Intrusion Detection and Identification System (IDIS), which builds a profile for each user in an intranet to keep track his/her usage habits as forensic features with which IDIS can identify who the underlying user in the intranet is. Our experimental results show that the recognition accuracy of students of computer science department is up to 98.99%.
ISSN:1690-4524