Enter your keyword

2-s2.0-84922200796

[vc_empty_space][vc_empty_space]

Anomaly-based intrusion detection and prevention system on website usage using rule-growth sequential pattern analysis: Case study: Statistics of Indonesia (BPS) website

Trio Pramono Y.W.a, Suhardia

a School of Electrical Engineering and Informatics, Institut Teknologi Bandung (ITB), Bandung, Indonesia

[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_separator css=”.vc_custom_1624529070653{padding-top: 30px !important;padding-bottom: 30px !important;}”][/vc_column_inner][/vc_row_inner][vc_row_inner layout=”boxed”][vc_column_inner width=”3/4″ css=”.vc_custom_1624695412187{border-right-width: 1px !important;border-right-color: #dddddd !important;border-right-style: solid !important;border-radius: 1px !important;}”][vc_empty_space][megatron_heading title=”Abstract” size=”size-sm” text_align=”text-left”][vc_column_text]© 2014 IEEE.Websites are now widely used by many public and private sectors known to be the most popular system that is able to reach many users in many platforms through internet. Since websites are generally placed as a public domain, there is a large chance of intruders to compromise the system at any time. C-panel raw access log data nowadays widely used by many security tools to analysis the user behaviors regarding to the activities on the web, however they commonly provide the descriptive analysis, rather than prescriptive analysis for prediction and estimation. In this paper, we introduce the solution about the website security protection mechanism by investigating the user behaviors using sequential rule-pattern analysis. Rule-patterns of user behaviors are created by mining the log data with sequential pattern analysis in near real time. Using anomaly-based intrusion detection and prevention system approach, our proposed system then can predict the user behaviors activities whether identified as baseline patterns or malicious patterns.[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Author keywords” size=”size-sm” text_align=”text-left”][vc_column_text]Anomaly-based intrusion detection,Descriptive analysis,Pattern analysis,Public and private sector,Sequential patterns,Sequential rule,User behaviors,Website securities[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Indexed keywords” size=”size-sm” text_align=”text-left”][vc_column_text]intrusion detection,sequential pattern,user behavior,website security[/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”Funding details” size=”size-sm” text_align=”text-left”][vc_column_text][/vc_column_text][vc_empty_space][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][vc_empty_space][megatron_heading title=”DOI” size=”size-sm” text_align=”text-left”][vc_column_text]https://doi.org/10.1109/ICAICTA.2014.7005941[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/4″][vc_column_text]Widget Plumx[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row][vc_column][vc_separator css=”.vc_custom_1624528584150{padding-top: 25px !important;padding-bottom: 25px !important;}”][/vc_column][/vc_row]