TY - JOUR T1 - An Automated to Discover Internal Attacks by using IIDPS AU - Rajesh Kanna, P. AU - Murugesan, M. JO - International Journal of Soft Computing VL - 16 IS - 4 SP - 78 EP - 81 PY - 2021 DA - 2001/08/19 SN - 1816-9503 DO - ijscomp.2021.78.81 UR - https://makhillpublications.co/view-article.php?doi=ijscomp.2021.78.81 KW - Data mining KW -insider attack KW -system calls (SCs) KW -user’s behaviors and intrusion detection AB - In recent decades the computer use login ID and credentials scheme to validate handlers. Sharing of credentials between co users in a company is unavoidable at certain cases which in turn becomes the vulnerable ideas of processor security. Insider attackers are the authorized users who attack the system internally. The firewalls and IDS protect the system from external attackers only. The user’s personal profile is created by IIDPS to preserve path of user’s habits. This system calls checks user behavior profile, then detect for attackers. However, the IIDPS system only detects the attacker and do not perform any actions to deny the service. The System architecture of improved IIDPS provides high security performance by investigating third-party shell commands and analyzes the details of command and provides security code which is send to authorized user in wireless network using GSM. ER -