A Model of Illegal Access Detection System under Cloud Environment

Article Preview

Abstract:

In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model. Here, first of all, the normal behavior of the user is formed in the shape of a cloud model, then these models are compared with each other by using the cosine similarity method and by applying the collaborative filtering method the deviations from the normal behavior are evaluated. If the deviation value is above than the threshold, the user who gained access to the system is evaluated as illegal, otherwise he is evaluated as a real user.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1761-1766

Citation:

Online since:

September 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Cloud Security Alliance . Top Threats to Cloud Computing. (2010).

Google Scholar

[2] Salem, M.B. and Stolfo, S.J. Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned. Columbia University Computer Science Technical Reports, Columbia University, 8 p. (2011).

Google Scholar

[3] 2010 Cybersecurity Watch Survey: Cybercrime Increasing Faster than Some Company Defenses. CERT, 17 p. (2010).

Google Scholar

[4] Arrington, M. In Our Inbox: Hundreds of Confidential Twitter Documents. (2009).

Google Scholar

[5] Takahashi, D. French Hacker Who Leaked Twitter Documents to TechCrunch Is Busted. (2010).

Google Scholar

[6] Allen, P. Obama's Twitter Password Revealed after French Hacker Arrested for Breaking into U.S. President's Accoun. (2010).

Google Scholar

[7] Alguliev, R.M. and Abdullayeva, F.C. Identity Management Based Security Architecture of Cloud Computing on Multi-Agent Systems. Proceedings of the Third International Conference on Innovative Computing Technology, London, 29-31 August, 123-126. (2013).

DOI: 10.1109/intech.2013.6653643

Google Scholar

[8] Information on http: /www. schonlau. net/intrusion. html.

Google Scholar

[9] Greenberg, S. Using Unix: Collected Traces of 168 Users. Report, University of Calgary. (1988).

Google Scholar

[10] Lane, T. and Brodley, C.E. An Application of Machine Learning to Anomaly Detection. Proceedings of the 20th National Information Systems Security Conference, 14 February, 366-380. (1997).

Google Scholar

[11] Salem, M.B. and Stolfo, S.J. Modeling User Search Behavior for Masquerade Detection. Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, 181-200. (2011).

DOI: 10.1007/978-3-642-23644-0_10

Google Scholar