Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud

被引:13
|
作者
Babu, B. Mahesh [1 ]
Bhanu, Mary Saira [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
关键词
Cloud; Insider threat; Keystroke dynamics; Risk; Trust;
D O I
10.1016/j.procs.2015.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most dangerous threats faced by organizations are insider attacks. Since insiders are aware of the underlying system, handling insider attack is a most deterring task. The volume of attacks posed by insiders on cloud is very much higher than the traditional systems, as the attack vector and scope of the attack is high in cloud(1). Insider attack affects the reputation and productivity of the organization and drags it into losses. Insiders may cause damage accidentally or intentionally. Proper management of privileges reduces the threats posed by insiders. So by properly managing privileges, insider threats can be reduced. This paper proposes a privilege management mechanism which manages the users by incorporating risk, trust into an access control mechanism to develop more scalable and flexible prevention mechanism against insider attacks. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:157 / 166
页数:10
相关论文
共 50 条
  • [31] Integrating a High-Reliability Multicriteria Trust Evaluation Model with Task Role-Based Access Control for Cloud Services
    Alshammari, Salah T.
    Albeshri, Aiiad
    Alsubhi, Khalid
    SYMMETRY-BASEL, 2021, 13 (03):
  • [32] A Trust-Game-Based Access Control Model for Cloud Service
    Pan Jun, Sun
    MOBILE INFORMATION SYSTEMS, 2020, 2020
  • [33] MTBAC: A Mutual Trust Based Access Control Model in Cloud Computing
    Lin Guoyuan
    Wang Danru
    Bie Yuyu
    Lei Min
    CHINA COMMUNICATIONS, 2014, 11 (04) : 154 - 162
  • [34] A Novel Role-based Access Control Model in Cloud Environments
    Jun Luo
    Hongjun Wang
    Xun Gong
    Tianrui Li
    International Journal of Computational Intelligence Systems, 2016, 9 : 1 - 9
  • [35] A deep learning model based anomalous behavior detection for supporting verifiable access control scheme in cloud servers
    Vijayanand, S.
    Saravanan, S.
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2022, 42 (06) : 6171 - 6181
  • [36] A Model of Role-Risk Based Intrusion Prevention for Cloud Environment
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 530 - 535
  • [37] Integrating Trust with Cryptographic Role-based Access Control for Secure Cloud Data Storage
    Zhou, Lan
    Varadharajan, Vijay
    Hitchens, Michael
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 560 - 569
  • [38] Secure Cloud Storage System by Integrating Trust with Role Based Access Control and Cryptographic Algorithm
    Bhise, Avdhut Suryakant
    Latif, Patil M. Toushif
    TECHNO-SOCIETAL 2018: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SOCIETAL APPLICATIONS - VOL 2, 2020, : 87 - 97
  • [39] Hadoop Cloud Platform Dynamic Access Control Based on User Behavior Assessment
    Yang H.-Y.
    Meng L.-X.
    1600, Beijing Institute of Technology (37): : 1031 - 1035and1042
  • [40] Insider Threat Detection Based on User and Entity Behavior Analysis with a Hybrid Model
    Song, Yue
    Yuan, Jianting
    INFORMATION SECURITY, PT II, ISC 2024, 2025, 15258 : 323 - 340