Security and Identification of Internal Intrusions by Self-Monitoring
DOI:
https://doi.org/10.32628/CSEIT25112861Keywords:
System calls, malicious activity, intrusion detection, internal attacksAbstract
The increasing reliance on the internet by billions worldwide has made cyber security a vital concern. Among emerging security solutions, intrusion detection technologies have gained importance for their ability to monitor systems and prevent unauthorized activities. These systems use localized network mechanisms to continuously observe user behaviors and identify potential threats over time. To enhance system security, this project introduces a novel framework known as the Call-Level Intrusion Detection and Protection System, which creates and updates user behavior profiles to detect anomalies effectively. The performance of the proposed model has been validated through the use of forensic analysis and established intrusion detection methodologies. Additionally, this research reviews prior studies focused on Intrusion Detection Systems (IDS) and Internal Intrusion Detection Systems (IIDS). Building upon this foundation, a new IIDS model was developed, utilizing advanced algorithms to differentiate between legitimate and malicious activities within network infrastructures.
Downloads
References
A Self-Attention-Based Deep Convolutional Neural Networks for IIoT Networks Intrusion Detection
DTITD: An Intelligent Insider Threat Detection Framework Based on Digital Twin and Self-Attention Based Deep Learning Models
Hunt for Unseen Intrusion: Multi-Head Self-Attention Neural Detector
Network Intrusion Detection Method Based on CNN-BiLSTM-Attention Model
S. Li, G. Chai, Y. Wang, G. Zhou, Z. Li, D. Yu, and R. Gao, “CRSF: An intrusion detection framework for industrial Internet of Things based on pretrained CNN2D-RNN and SVM,” IEEE Access, vol. 11, pp. 92041–92054
Y. Zhang, C. Yang, K. Huang, and Y. Li, “Intrusion detection of indus trial Internet-of-Things based on reconstructed graph neural networks,” IEEE Trans. Netw. Sci. Eng., vol. 10, no. 5, pp. 2894–2905
M.Mohy-eddine, A.Guezzaz, S. Benkirane, and M. Azrour, “An effective intrusion detection approach based on ensemble learning for IIoT edge computing,” J. Comput. Virol. Hacking Techn
M.Nuaimi,L.C.Fourati,andB.B.Hamed,“Intelligentapproachestoward in trusion detection systems for industrial Internet of Things: A systematic comprehensive review,” J. Netw. Comput. Appl.
M. Tanveer and S. Shabala, “Entangling the interaction between essential and nonessential nutrients: Implications for global food security,” in Plant Nutrition and Food Security in the Era of Climate Change. Amsterdam, The Netherlands: Elsevier
Q. Wang, X. Zhu, Y. Ni, L. Gu, and H. Zhu, “Blockchain for the IoT and industrial IoT: A review,” Internet Things.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.