{"title":"使用击键动力学分析用户行为以保护云免受恶意内部人员的攻击","authors":"Mahesh Babu Bondada, S. M. Bhanu","doi":"10.1109/CCEM.2014.7015481","DOIUrl":null,"url":null,"abstract":"Nowadays cloud computing is growing vastly as the number of companies are depending mostly on this technology due to its advantages. All the data are stored across the globe and maintained by the cloud service providers i.e., the responsibility of the data is in the hands of cloud providers. The data breach is a biggest problem in cloud as the data are shared across the globe and sensitive information of the customer is stored at some third party storage site. Security of the data is the major concern in cloud from outsiders as well as insiders. Insider attack is the most devastating threat due to the familiarity of the underlying system to the insiders. The proposed approach mitigates this threat by a host based user profiling technique where a key stroke dynamics is used for analyzing the user behavior and a retraining approach is also proposed as the imposter patterns are absent at the time of registration. Retraining boosts the overall system performance in mitigating the insider threat.","PeriodicalId":143177,"journal":{"name":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"Analyzing User Behavior Using Keystroke Dynamics to Protect Cloud from Malicious Insiders\",\"authors\":\"Mahesh Babu Bondada, S. M. Bhanu\",\"doi\":\"10.1109/CCEM.2014.7015481\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays cloud computing is growing vastly as the number of companies are depending mostly on this technology due to its advantages. All the data are stored across the globe and maintained by the cloud service providers i.e., the responsibility of the data is in the hands of cloud providers. The data breach is a biggest problem in cloud as the data are shared across the globe and sensitive information of the customer is stored at some third party storage site. Security of the data is the major concern in cloud from outsiders as well as insiders. Insider attack is the most devastating threat due to the familiarity of the underlying system to the insiders. The proposed approach mitigates this threat by a host based user profiling technique where a key stroke dynamics is used for analyzing the user behavior and a retraining approach is also proposed as the imposter patterns are absent at the time of registration. Retraining boosts the overall system performance in mitigating the insider threat.\",\"PeriodicalId\":143177,\"journal\":{\"name\":\"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)\",\"volume\":\"26 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCEM.2014.7015481\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCEM.2014.7015481","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analyzing User Behavior Using Keystroke Dynamics to Protect Cloud from Malicious Insiders
Nowadays cloud computing is growing vastly as the number of companies are depending mostly on this technology due to its advantages. All the data are stored across the globe and maintained by the cloud service providers i.e., the responsibility of the data is in the hands of cloud providers. The data breach is a biggest problem in cloud as the data are shared across the globe and sensitive information of the customer is stored at some third party storage site. Security of the data is the major concern in cloud from outsiders as well as insiders. Insider attack is the most devastating threat due to the familiarity of the underlying system to the insiders. The proposed approach mitigates this threat by a host based user profiling technique where a key stroke dynamics is used for analyzing the user behavior and a retraining approach is also proposed as the imposter patterns are absent at the time of registration. Retraining boosts the overall system performance in mitigating the insider threat.