Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud

被引:13
作者
Babu, B. Mahesh [1 ]
Bhanu, Mary Saira [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Tiruchirappalli, Tamil Nadu, India
来源
ELEVENTH INTERNATIONAL CONFERENCE ON COMMUNICATION NETWORKS, ICCN 2015/INDIA ELEVENTH INTERNATIONAL CONFERENCE ON DATA MINING AND WAREHOUSING, ICDMW 2015/NDIA ELEVENTH INTERNATIONAL CONFERENCE ON IMAGE AND SIGNAL PROCESSING, ICISP 2015 | 2015年 / 54卷
关键词
Cloud; Insider threat; Keystroke dynamics; Risk; Trust;
D O I
10.1016/j.procs.2015.06.018
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The most dangerous threats faced by organizations are insider attacks. Since insiders are aware of the underlying system, handling insider attack is a most deterring task. The volume of attacks posed by insiders on cloud is very much higher than the traditional systems, as the attack vector and scope of the attack is high in cloud(1). Insider attack affects the reputation and productivity of the organization and drags it into losses. Insiders may cause damage accidentally or intentionally. Proper management of privileges reduces the threats posed by insiders. So by properly managing privileges, insider threats can be reduced. This paper proposes a privilege management mechanism which manages the users by incorporating risk, trust into an access control mechanism to develop more scalable and flexible prevention mechanism against insider attacks. (C) 2015 The Authors. Published by Elsevier B.V. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
引用
收藏
页码:157 / 166
页数:10
相关论文
共 15 条
  • [1] [Anonymous], 2002, Managing Information Security Risks: The OCTAVE Approach
  • [2] [Anonymous], 2011, P 16 ACM S ACC CONTR
  • [3] [Anonymous], NOT 9 CLOUD COMP TOP
  • [4] [Anonymous], 2008, INTRO INFORM RETRIEV, DOI DOI 10.1017/CBO9780511809071
  • [5] Fuzzy multi-level security : An experiment on quantified risk-adaptive access control - Extended abstract
    Cheng, Pau-Chen
    Rohatgi, Pankaj
    Keser, Claudia
    Karger, Paul A.
    Wagner, Grant M.
    Reninger, Angela Schuett
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 222 - +
  • [6] Securing the Cloud-Governance, Risk, and Compliance Issues Reign Supreme
    Farrell, Rhonda
    [J]. INFORMATION SECURITY JOURNAL, 2010, 19 (06): : 310 - 319
  • [7] User identity verification via mouse dynamics
    Feher, Clint
    Elovici, Yuval
    Moskovitch, Robert
    Rokach, Lior
    Schclar, Alon
    [J]. INFORMATION SCIENCES, 2012, 201 : 19 - 36
  • [8] Scalable risk assessment method for cloud computing using game theory (CCRAM)
    Furuncu, Evrim
    Sogukpinar, Ibrahim
    [J]. COMPUTER STANDARDS & INTERFACES, 2015, 38 : 44 - 50
  • [9] Jones J., 2006, Norwich J. Inf. Assur, V2, P67
  • [10] Keshlaf Ayad Ali, 2010, Proceedings of the Fifth International Conference on Internet Monitoring and Protection (ICIMP 2010), P22, DOI 10.1109/ICIMP.2010.12