🕔 Call For Paper — Vol. 13 | Issue 4 | April 2026 | Deadline: 30-Apr-2026
Track Paper Submit Paper Home
📢 NOTICE
📢 Call for Papers — Volume 12, Issue 4 (April 2026) | Submission Deadline: April 30, 2026 | Rapid peer review: 2–3 days | Impact Factor: 7.37 (SJIF 2026)

Paper Details

📄 IJAERD-OJS-1775

An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques

Author(s):Wayal Rupesh, Jadhav Sagar, Sale Rahul
Institution:Department Of Comp.Engg, Jaihind college of engineering
Published In:Vol. 3, Issue 11 — November 2016
Page No.:148-152
Domain:Engineering
Type:Research Paper
ISSN (Online):2348-4470
ISSN (Print):2348-6406
Abstract

Currently, most pc systems use user IDs and passwords because the login patterns to demonstrate users.However, many people share their login pattern with co employees and request these co employees to help co-tasks,there by creating the pattern in concert of the weakest points of pc security. Corporate executive attackers, the validusers of a system UN agency attack the system internally, area unit arduous to observe since most intrusion detectionsystems and firewalls establish and isolate malicious behaviors launched from the skin world of the system solely.Additionally, some studies claimed that analyzing supervisor call instruction (SCs) generated by commands will establishthese commands, with that to accurately observe attacks, associated attack patterns area unit the options of an attack.Therefore, during this paper, a security system, named the inner Intrusion Detection and Protection System (IIDPS), isplanned to observe corporate executive attacks at SC level by victimization data processing and rhetorical techniques.The IIDPS creates users’ personal profiles to stay track of users’ usage habits as their rhetorical options and determineswhether or not a legitimate login user is that the account holder or not by scrutiny his/her current pc usage behaviorswith the patterns collected within the account holder’s personal profile. The experimental result demonstrate that theIIDPS’s user identification accuracy is ninety four.29%, whereas the interval is a smaller amount than zero.45 s,implying that it will stop a protected system from corporate executive attacks effectively and expeditiously.

🗎 Download PDF 🏆 Get Certificate
🕮 How to Cite

Wayal Rupesh, Jadhav Sagar, Sale Rahul, “An Internal Intrusion Detection and Protection System by Using Data Mining and Forensic Techniques”, International Journal of Advance Engineering and Research Development (IJAERD), Vol. 3, Issue 11, pp. 148-152, November 2016.

Related Papers

📄 Submit Your Paper

Open Access • Peer Reviewed • CrossRef DOI
UGC Approved • Monthly Publication

Submit Now →
📅 Submission Deadline
30 Apr 2026
Vol. 13 | Issue 4
April 2026