首页> 外文会议>International Conference on Adaptive Science and Technology >Detecting a malicious insider in the cloud environment using sequential rule mining
【24h】

Detecting a malicious insider in the cloud environment using sequential rule mining

机译:使用顺序规则挖掘检测云环境中的恶意内幕人员

获取原文

摘要

Cloud computing is a growing paradigm that offers a lot of benefits to cloud users. Despite the potential benefits that cloud computing could offer to business and individuals, security remains one of the growing concerns that are hindering the adoption of this paradigm. Researchers have identified and dealt with many security threats to cloud computing. However, insider threats still remain as one of the major concerns. Threats from malicious insiders are often listed as dangerous threats by many researchers. However, this threat has not received the attention it deserves because many organizations turn out to be extra careful about external threats than insider threats. This paper discusses an approach that can help in identifying insiders behaving in a malicious way, which may lead to an attack. A rule learning algorithm was used in learning the behavior pattern of users, in order to build user profiles. A Matching algorithm was then used to match the historical behavior of the user with the current behavior, in order to identify users that masquerade in the system as normal users. The obtained results show that it was possible to identify insiders that masquerade in the system by observing their behavior patterns.
机译:云计算是一个越来越多的范式,为云用户提供了很多好处。尽管云计算可以向商业和个人提供潜在的益处,但安全仍然是越来越令人越来越多的担忧,妨碍了这种范式。研究人员已经确定并处理了许多对云计算的安全威胁。但是,内部威胁仍然是主要问题之一。恶意内部人员的威胁通常被许多研究人员列为危险的威胁。然而,这种威胁并没有受到应得的关注,因为许多组织都要对外威胁而不是内部威胁。本文讨论了一种可以帮助识别以恶意方式表现的内部人士的方法,这可能导致攻击。使用规则学习算法用于学习用户的行为模式,以便构建用户配置文件。然后使用匹配算法与用户的历史行为匹配当前行为,以便识别在系统中伪装在系统中的用户。获得的结果表明,通过观察其行为模式,可以识别在系统中伪装在系统中的内部人。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号