Detecting Unauthorized Access of Personal Device
Keywords:
Unauthorized access, Personal device security, Authentication mechanisms, Anomaly detection, Privacy protection, Security breaches, Threat detectionAbstract
Unauthorized access to personal devices poses a severe concern to people's security and privacy in the digital age. The primary objective of this endeavour is to develop a dependable system for detecting and preventing such unauthorized access. The proposed system employs an interdisciplinary approach that integrates behaviour analysis, anomaly detection, and advanced authentication mechanisms. The system has robust authentication techniques, such as biometric identification and two-factor authentication, to ensure that only authorized users are allowed access. From then, users' interactions with the device are monitored through continuous behaviour analysis, which creates a baseline of normal behaviour. In the case that this baseline is deviated from, a warning signalling potential unauthorized access is issued. Algorithms for anomaly detection also identify peculiar behaviours or patterns, which enhances the system's ability to identify security breaches and respond quickly. Furthermore, the system incorporates machine learning models that adapt over time to new threats and emerging patterns. Updates and patches are frequently published to stay up to date with emerging attack methods. The proposed solution aims to safeguard confidential information and preserve user privacy in an increasingly interconnected environment by implementing this comprehensive approach and providing a proactive barrier against unauthorized access to personal devices.
Downloads
Metrics
References
Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.
Bansal, M., & Singh, V. K. (2019). Anomaly Detection Techniques: A Review. Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 342-346.
Aljawarneh, S., Aldwairi, M., Yassein, M. B., & Gupta, B. (2020). Deep Learning for Cybersecurity Threat Detection in Smart Devices: A Comprehensive Review. Journal of Information Security and Applications, 52, 102497.
Chaudhry, S. A., Farooq, U., Khalid, S., & Abbas, H. (2020). Internet of Things (IoT) Based Intrusion Detection System (IDS) Using Machine Learning Techniques: A Comprehensive Review. IEEE Access, 8, 169079-169106.
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly Detection: A Survey. ACM Computing Surveys (CSUR), 41(3), 1-58.
Garg, N., Kaur, P., & Bhatia, P. (2021). An Insight into Deep Learning Models for Intrusion Detection Systems: A Review. Journal of Cybersecurity and Privacy, 1(1), 1-21.
Gupta, M., & Patel, R. B. (2020). Deep Learning Based Approach for Intrusion Detection System: A Survey. Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), 1-6.
Hassan, M. M., Uddin, M. Z., Almogren, A., & Fortino, G. (2018). An Intrusion Detection System Using Deep Neural Network for In-Vehicle Security. IEEE Transactions on Intelligent Transportation Systems, 20(12), 4544-4557.
Jaiswal, A., Tiwari, A., & Thakur, A. (2017). Machine Learning Techniques for Intrusion Detection System: A Review. Proceedings of the 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), 248-253.
Khan, R., & Bhuiyan, M. Z. A. (2019). Deep learning for phishing detection: A comprehensive review. Journal of Information Security and Applications, 48, 102393.
Kim, J., Kim, S., Song, S., & Kim, H. (2016). A Study on Deep Learning based Malware Detection Techniques. Journal of Information Processing Systems, 12(1), 88-103.
Nguyen, H. H., Nguyen, T. T., Dinh, T. N., & Pham, V. T. (2021). A Survey of Deep Learning Techniques for Network Intrusion Detection Systems. Journal of Information Security and Applications, 60, 102662.
Kwon, K., Lee, J., & Kim, J. (2017). Anomaly Detection System Using Deep Learning for Big Data Security in Internet of Things. IEEE Access, 5, 26007-26017.
Li, X., Chen, S., Hu, X., & Niu, J. (2017). A Survey of Intrusion Detection Systems Based on Deep Learning. Journal of Network and Computer Applications, 83, 1-16.
Samuel, J. M., & Rajeswari, A. (2020). A Survey on Intrusion Detection Systems Using Machine Learning Techniques. Proceedings of the 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 1-6.
Sun, Y., Wong, K., & Wang, H. (2019). Intrusion Detection Techniques Based on Deep Learning: A Comprehensive Survey. Journal of Network and Computer Applications, 151, 102417.
Nguyen, D., Armitage, G., & Tague, P. (2020). A Review of Network Intrusion Detection and Prevention Systems. IEEE Communications Surveys & Tutorials, 22(1), 607-651.
Moustafa, N., & Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), 1-6.
Sgouras, V. D., & Sirakoulis, G. Ch. (2017). A Review of Deep Learning Techniques for Intrusion Detection Systems. Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN), 2547-2554.
Liu, Z., & Lu, Y. (2020). A Survey of Deep Learning-Based Network Intrusion Detection Systems. IEEE Access, 8, 122615-122631.
Rashidi, B., Mavridis, N., & Al-Fuqaha, A. (2021). A Comprehensive Review on Intrusion Detection Systems using Machine Learning and Deep Learning. arXiv preprint arXiv:2103.14755.
Theera-Umpon, N., & Auephanwiriyakul, S. (2019). A Survey on Anomaly Detection using Artificial Neural Networks. Neural Computing and Applications, 31(12), 8277-8292.
Vajda, A., & Buttler, D. (2018). A Survey of Distributed Anomaly Detection Using Autoencoders. IEEE Transactions on Network and Service Management, 15(2), 894-907.
Le, N. D., Pham, T. D., Huynh, T. T., & Ha, Q. T. (2021). A Review of Deep Learning Techniques for Intrusion Detection Systems. Information, 12(2), 51.
Mahmood, T., Akram, S., Mehmood, A., & Ahmed, F. (2018). Review on intrusion detection system using machine learning algorithms. Proceedings of the 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1-6.
Taylor, T., & Chow, P. (2021). Deep Learning for Network Intrusion Detection: A Review. IEEE Access, 9, 11381-11396.
Viegas, E. K., & Guedes, L. A. (2021). Deep Learning Techniques for Intrusion Detection: A Review. Proceedings of the 2021 26th International Conference on Telecommunications (ICT), 1-6.
Shone, N., Ngoc, T. N., & Kieu, T. A. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50.
Saleem, M. A., & Mohaisen, A. (2020). Deep Learning for Malware Detection: A Survey. IEEE Communications Surveys & Tutorials, 22(1), 460-487.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
Terms:
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.