Detecting Unauthorized Access of Personal Device

Authors

  • S. Jerald Nirmal kumar
  • Aravindan Srinivasan
  • V. Sasirekha
  • Viswanathan Ramasamy Reddy
  • T. Vengatesh

Keywords:

Unauthorized access, Personal device security, Authentication mechanisms, Anomaly detection, Privacy protection, Security breaches, Threat detection

Abstract

Unauthorized access to personal devices poses a severe concern to people's security and privacy in the digital age. The primary objective of this endeavour is to develop a dependable system for detecting and preventing such unauthorized access. The proposed system employs an interdisciplinary approach that integrates behaviour analysis, anomaly detection, and advanced authentication mechanisms. The system has robust authentication techniques, such as biometric identification and two-factor authentication, to ensure that only authorized users are allowed access. From then, users' interactions with the device are monitored through continuous behaviour analysis, which creates a baseline of normal behaviour. In the case that this baseline is deviated from, a warning signalling potential unauthorized access is issued. Algorithms for anomaly detection also identify peculiar behaviours or patterns, which enhances the system's ability to identify security breaches and respond quickly. Furthermore, the system incorporates machine learning models that adapt over time to new threats and emerging patterns. Updates and patches are frequently published to stay up to date with emerging attack methods. The proposed solution aims to safeguard confidential information and preserve user privacy in an increasingly interconnected environment by implementing this comprehensive approach and providing a proactive barrier against unauthorized access to personal devices.

Downloads

Download data is not yet available.

Metrics

Metrics Loading ...

References

Buczak, A. L., & Guven, E. (2016). A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection. IEEE Communications Surveys & Tutorials, 18(2), 1153-1176.

Bansal, M., & Singh, V. K. (2019). Anomaly Detection Techniques: A Review. Proceedings of the 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI), 342-346.

Aljawarneh, S., Aldwairi, M., Yassein, M. B., & Gupta, B. (2020). Deep Learning for Cybersecurity Threat Detection in Smart Devices: A Comprehensive Review. Journal of Information Security and Applications, 52, 102497.

Chaudhry, S. A., Farooq, U., Khalid, S., & Abbas, H. (2020). Internet of Things (IoT) Based Intrusion Detection System (IDS) Using Machine Learning Techniques: A Comprehensive Review. IEEE Access, 8, 169079-169106.

Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly Detection: A Survey. ACM Computing Surveys (CSUR), 41(3), 1-58.

Garg, N., Kaur, P., & Bhatia, P. (2021). An Insight into Deep Learning Models for Intrusion Detection Systems: A Review. Journal of Cybersecurity and Privacy, 1(1), 1-21.

Gupta, M., & Patel, R. B. (2020). Deep Learning Based Approach for Intrusion Detection System: A Survey. Proceedings of the 2020 5th International Conference on Computing, Communication and Security (ICCCS), 1-6.

Hassan, M. M., Uddin, M. Z., Almogren, A., & Fortino, G. (2018). An Intrusion Detection System Using Deep Neural Network for In-Vehicle Security. IEEE Transactions on Intelligent Transportation Systems, 20(12), 4544-4557.

Jaiswal, A., Tiwari, A., & Thakur, A. (2017). Machine Learning Techniques for Intrusion Detection System: A Review. Proceedings of the 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), 248-253.

Khan, R., & Bhuiyan, M. Z. A. (2019). Deep learning for phishing detection: A comprehensive review. Journal of Information Security and Applications, 48, 102393.

Kim, J., Kim, S., Song, S., & Kim, H. (2016). A Study on Deep Learning based Malware Detection Techniques. Journal of Information Processing Systems, 12(1), 88-103.

Nguyen, H. H., Nguyen, T. T., Dinh, T. N., & Pham, V. T. (2021). A Survey of Deep Learning Techniques for Network Intrusion Detection Systems. Journal of Information Security and Applications, 60, 102662.

Kwon, K., Lee, J., & Kim, J. (2017). Anomaly Detection System Using Deep Learning for Big Data Security in Internet of Things. IEEE Access, 5, 26007-26017.

Li, X., Chen, S., Hu, X., & Niu, J. (2017). A Survey of Intrusion Detection Systems Based on Deep Learning. Journal of Network and Computer Applications, 83, 1-16.

Samuel, J. M., & Rajeswari, A. (2020). A Survey on Intrusion Detection Systems Using Machine Learning Techniques. Proceedings of the 2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 1-6.

Sun, Y., Wong, K., & Wang, H. (2019). Intrusion Detection Techniques Based on Deep Learning: A Comprehensive Survey. Journal of Network and Computer Applications, 151, 102417.

Nguyen, D., Armitage, G., & Tague, P. (2020). A Review of Network Intrusion Detection and Prevention Systems. IEEE Communications Surveys & Tutorials, 22(1), 607-651.

Moustafa, N., & Slay, J. (2015). UNSW-NB15: A Comprehensive Data Set for Network Intrusion Detection Systems (UNSW-NB15 Network Data Set). Proceedings of the 2015 Military Communications and Information Systems Conference (MilCIS), 1-6.

Sgouras, V. D., & Sirakoulis, G. Ch. (2017). A Review of Deep Learning Techniques for Intrusion Detection Systems. Proceedings of the 2017 International Joint Conference on Neural Networks (IJCNN), 2547-2554.

Liu, Z., & Lu, Y. (2020). A Survey of Deep Learning-Based Network Intrusion Detection Systems. IEEE Access, 8, 122615-122631.

Rashidi, B., Mavridis, N., & Al-Fuqaha, A. (2021). A Comprehensive Review on Intrusion Detection Systems using Machine Learning and Deep Learning. arXiv preprint arXiv:2103.14755.

Theera-Umpon, N., & Auephanwiriyakul, S. (2019). A Survey on Anomaly Detection using Artificial Neural Networks. Neural Computing and Applications, 31(12), 8277-8292.

Vajda, A., & Buttler, D. (2018). A Survey of Distributed Anomaly Detection Using Autoencoders. IEEE Transactions on Network and Service Management, 15(2), 894-907.

Le, N. D., Pham, T. D., Huynh, T. T., & Ha, Q. T. (2021). A Review of Deep Learning Techniques for Intrusion Detection Systems. Information, 12(2), 51.

Mahmood, T., Akram, S., Mehmood, A., & Ahmed, F. (2018). Review on intrusion detection system using machine learning algorithms. Proceedings of the 2018 International Conference on Computing, Mathematics and Engineering Technologies (iCoMET), 1-6.

Taylor, T., & Chow, P. (2021). Deep Learning for Network Intrusion Detection: A Review. IEEE Access, 9, 11381-11396.

Viegas, E. K., & Guedes, L. A. (2021). Deep Learning Techniques for Intrusion Detection: A Review. Proceedings of the 2021 26th International Conference on Telecommunications (ICT), 1-6.

Shone, N., Ngoc, T. N., & Kieu, T. A. (2018). A Deep Learning Approach to Network Intrusion Detection. IEEE Transactions on Emerging Topics in Computational Intelligence, 2(1), 41-50.

Saleem, M. A., & Mohaisen, A. (2020). Deep Learning for Malware Detection: A Survey. IEEE Communications Surveys & Tutorials, 22(1), 460-487.

Downloads

Published

2025-04-11

How to Cite

1.
kumar SJN, Srinivasan A, V. Sasirekha VS, Ramasamy Reddy V, T. Vengatesh TV. Detecting Unauthorized Access of Personal Device. J Neonatal Surg [Internet]. 2025Apr.11 [cited 2025Apr.18];14(15S):22-31. Available from: https://jneonatalsurg.com/index.php/jns/article/view/3439

Most read articles by the same author(s)