Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud

被引:13
|
作者
Babu, B. Mahesh [1 ]
Bhanu, Mary Saira [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
关键词
Cloud; Insider threat; Keystroke dynamics; Risk; Trust;
D O I
10.1016/j.procs.2015.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most dangerous threats faced by organizations are insider attacks. Since insiders are aware of the underlying system, handling insider attack is a most deterring task. The volume of attacks posed by insiders on cloud is very much higher than the traditional systems, as the attack vector and scope of the attack is high in cloud(1). Insider attack affects the reputation and productivity of the organization and drags it into losses. Insiders may cause damage accidentally or intentionally. Proper management of privileges reduces the threats posed by insiders. So by properly managing privileges, insider threats can be reduced. This paper proposes a privilege management mechanism which manages the users by incorporating risk, trust into an access control mechanism to develop more scalable and flexible prevention mechanism against insider attacks. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:157 / 166
页数:10
相关论文
共 50 条
  • [1] A Dynamic Risk-based Access Control Model for Cloud Computing
    Chen, Aiguo
    Xing, Hanwen
    She, Kun
    Duan, Guiduo
    PROCEEDINGS OF 2016 IEEE INTERNATIONAL CONFERENCES ON BIG DATA AND CLOUD COMPUTING (BDCLOUD 2016) SOCIAL COMPUTING AND NETWORKING (SOCIALCOM 2016) SUSTAINABLE COMPUTING AND COMMUNICATIONS (SUSTAINCOM 2016) (BDCLOUD-SOCIALCOM-SUSTAINCOM 2016), 2016, : 579 - 584
  • [2] Detecting Insider Threat Based on Document Access Behavior Analysis
    Zhang, Rui
    Chen, Xiaojun
    Shi, Jinqiao
    Xu, Fei
    Pu, Yiguo
    WEB TECHNOLOGIES AND APPLICATIONS, APWEB 2014, PT II, 2014, 8710 : 376 - 387
  • [3] Risk Based Access Control In Cloud Computing
    Lakshmi, H.
    Namitha, S.
    Seemanthini
    Gopalan, Satheesh
    Sanjay, H. A.
    Chandrashekaran, K.
    Bhaskar, Atul
    2015 INTERNATIONAL CONFERENCE ON GREEN COMPUTING AND INTERNET OF THINGS (ICGCIOT), 2015, : 1502 - 1505
  • [4] A cloud-user behavior assessment based dynamic access control model
    Jing X.
    Liu Z.
    Li S.
    Qiao B.
    Tan G.
    International Journal of System Assurance Engineering and Management, 2017, 8 (Suppl 3) : 1966 - 1975
  • [5] Dynamic Risk Access Control Model for Cloud Platform
    Xie, Lixia
    Wei, Ruixin
    Ning, Yuguang
    Yang, Hongyu
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 12 - 22
  • [6] On the Possibility of Insider Threat Prevention Using Intent-Based Access Control (IBAC)
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    IEEE SYSTEMS JOURNAL, 2017, 11 (02): : 373 - 384
  • [7] Integrating Cyber Deception Into Attribute-Based Access Control (ABAC) for Insider Threat Detection
    Alohaly, Manar
    Balogun, Olusesi
    Takabi, Daniel
    IEEE ACCESS, 2022, 10 : 108965 - 108978
  • [8] Security analysis of access control model in hybrid cloud based on security entropy
    车天伟
    Ma Jianfeng
    Li Na
    Wang Chao
    HighTechnologyLetters, 2015, 21 (02) : 200 - 204
  • [9] A Dynamic Risk and Role-based Access Control Model in Cloud Computing Environment
    Bai, Xin
    2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING, INFORMATION SCIENCE AND INTERNET TECHNOLOGY (CII 2016), 2016, : 14 - 20
  • [10] Proxy based model to protect Cloud Infrastructure as Service (Iaas) platforms from DDOS attacks
    Prabhu, B. Rajalaxmi
    Hegde, Sandeep Kumar
    2014 3RD INTERNATIONAL CONFERENCE ON ECO-FRIENDLY COMPUTING AND COMMUNICATION SYSTEMS (ICECCS 2014), 2014, : 172 - 176