P. Rajesh Kanna, M. Murugesan, An Automated to Discover Internal Attacks by using IIDPS, International Journal of Soft Computing, Volume 16,Issue 4, 2021, Pages 78-81, ISSN 1816-9503, ijscomp.2021.78.81, (https://makhillpublications.co/view-article.php?doi=ijscomp.2021.78.81) Abstract: In recent decades the computer use login ID and credentials scheme to validate handlers. Sharing of credentials between co users in a company is unavoidable at certain cases which in turn becomes the vulnerable ideas of processor security. Insider attackers are the authorized users who attack the system internally. The firewalls and IDS protect the system from external attackers only. The user’s personal profile is created by IIDPS to preserve path of user’s habits. This system calls checks user behavior profile, then detect for attackers. However, the IIDPS system only detects the attacker and do not perform any actions to deny the service. The System architecture of improved IIDPS provides high security performance by investigating third-party shell commands and analyzes the details of command and provides security code which is send to authorized user in wireless network using GSM. Keywords: Data mining;insider attack;system calls (SCs);user’s behaviors and intrusion detection