首页> 外文会议>International Conference on Mobile and Secure Services >The Revelation of Insider Attacks Through Two-Step Intrusion Revelation Algorithm
【24h】

The Revelation of Insider Attacks Through Two-Step Intrusion Revelation Algorithm

机译:通过两步入侵揭示算法揭示内部攻击

获取原文

摘要

Big data stores a vast amount of data in the provider's infrastructure facility. The user is always reluctant in trusting a third party to save his/her sensitive information due to security concerns. There is a lack of focus on the leakage of confidential information by an insider. The work here is to detect these insider attack employing a two-step intrusion revelation algorithm and constructing a shielded communication channel for each of the processes to be executed in the system. In the first step, each of the processes passes through a controlled instruction sequence. The result of the chain is compared against the process stored in the duplicate nodes. Hence the system can be used to check the level of security in any big data workflow system.
机译:大数据将大量数据存储在提供商的基础设施中。由于安全方面的考虑,用户始终不愿意信任第三方来保存他/她的敏感信息。缺乏对内部人员泄露机密信息的关注。这里的工作是使用两步入侵揭示算法来检测这些内部攻击,并为系统中要执行的每个进程构造一个屏蔽的通信通道。在第一步中,每个过程都要经过一个受控指令序列。将链的结果与存储在重复节点中的过程进行比较。因此,该系统可用于检查任何大数据工作流系统中的安全级别。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号