This document proposes an Internal Intrusion Detection and Protection System (IIDPS) to detect insider attacks at the system call level using data mining and forensic techniques. The IIDPS creates user profiles by analyzing system calls to track user usage habits over time. When a user logs in, the IIDPS compares their current system usage behaviors to their profile to determine if they are the legitimate account holder or an insider attacker. The IIDPS was able to identify insider attackers with 94.29% accuracy and respond in under 0.45 seconds, showing its ability to effectively prevent insider attacks.