Reveal Deceit Entrance in the Cloud Computing Environment

Authors

  • Dr. Firoz Kayum Kajrekar  Department CS & IT, SPK, Sawantwadi, Maharashtra, India
  • Dr. C. D. Sonawane  Department CS & IT, YCC College, Sillod, Maharashtra, India

Keywords:

Cloud Computing; Masquerade Attack; Collaborative Filtering

Abstract

Paper states a strategy for detecting doubtful access to the cloud infrastructure. Collaborative filtering algorithm methods have been implemented to detect such doubtful access. The normal behavior of the user is formed in the shape of a cloud model, and these models is compared with each other by using the cosine similarity method and by applying the collaborative filtering method we try and find the deviations are evaluated as compare the normal usual behavior. If the deviated result is above than the threshold, the user who gained access to the system can be remarked as doubtful.

References

  1. Cloud Security Alliance (2010) Top Threats to Cloud Computing. https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf
  2. Salem, M.B. and Stolfo, S.J. (2011) Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned. Columbia University Computer Science Technical Reports, Columbia University, 8 p.
  3. (2010) 2010 Cybersecurity Watch Survey: Cybercrime Increasing Faster than Some Company Defenses. CERT, 17 p.
  4. Arrington, M. (2009) In Our Inbox: Hundreds of Confidential Twitter Documents. http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-of-confidential-twitter-documents/
  5. Takahashi, D. (2010) French Hacker Who Leaked Twitter Documents to TechCrunch Is Busted. http://venturebeat.com/2010/03/24/french-hacker-who-leaked-twitter-documents-to-techcrunch-is-busted/
  6. Danchev, D. (2009) ZDNET: French Hacker Gains Access to Twitter’s Admin Panel. http://www.zdnet.com/blog/security/french-hacker-gains-access-totwitters-admin-panel/3292
  7. Allen, P. (2010) Obama’s Twitter Password Revealed after French Hacker Arrested for Breaking into U.S. President’s Account. http://www.dailymail.co.uk/news/article-1260488/Barack-Obamas-Twitter-password-revealed-French-hacker-arrested.html
  8. Lane, T. and Brodley, C.E. (1997) Sequence Matching and Learning in Anomaly Detection for Computer Security. Proceedings of the AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, AAAI Press, 43-49.
  9. Alguliev, R.M. and Abdullayeva, F.C. (2013) Identity Management Based Security Arch. of Cloud Computing on Multi-Agent Systems. Proceedings of the Third International Conference on Innovative Computing Technology, London, 29-31 August, 123-126. http://dx.doi.org/10.1109/INTECH.2013.6653643
  10. Eliquliyev, R.M. and Abdullayeva, F.C. (2013) Bulud texnologiyalarının təhlükəsizlik problemlərinin tədqiqi və İnformasiya Texnologiyaları Problemləri, 1, 3-14.
  11. Coull, S.E., Branch, J., Szymanski, B. and Breimer, E. (2003) Intrusion Detection: A Bioinformatics Approach. Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, 8-12 December 24-33.
  12. Coull, S.E. and Szymanski, B.K. (2008) Sequence Alignment for Masquerade Detection. Computational Statistics and Data Analysis, 52, 4116-4131. http://dx.doi.org/10.1016/j.csda.2008.01.022
  13. Stolfo, S.J., Salem, M.B. and Keromytis, A.D. (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. Proceedings of the IEEE Symposium on Security and Privacy Workshops, San Francisco, 125-128.
  14. http://www.schonlau.net/intrusion.html
  15. Greenberg, S. (1988) Using Unix: Collected Traces of 168 Users. Report, University of Calgary.
  16. Lane, T. and Brodley, C.E. (1997) An Application of Machine Learning to Anomaly Detection. Proceedings of the 20th National Information Systems Security Conference, 14 February, 366-380.
  17. Salem, M.B. and Stolfo, S.J. (2011) Modeling User Search Behavior for Masquerade Detection. Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection, 181-200.

Downloads

Published

2018-02-28

Issue

Section

Research Articles

How to Cite

[1]
Dr. Firoz Kayum Kajrekar, Dr. C. D. Sonawane, " Reveal Deceit Entrance in the Cloud Computing Environment, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 1, pp.984-990, January-February-2018.