In this paper detection method for the illegal
access to the cloud infrastructure is proposed. Detection process is based on
the collaborative filtering algorithm constructed on the cloud model. Here,
first of all, the normal behavior of the user is formed in the shape of a cloud
model, then these models are compared with each other by using the cosine
similarity method and by applying the collaborative filtering method the
deviations from the normal behavior are evaluated. If the deviation value is
above than the threshold, the user who gained access to the system is evaluated
as illegal, otherwise he is evaluated as a real user.
Salem, M.B. and Stolfo, S.J. (2011) Data Collection and Analysis for Masquerade Attack Detection: Challenges and Lessons Learned. Columbia University Computer Science Technical Reports, Columbia University, 8 p.
Allen, P. (2010) Obama’s Twitter Password Revealed after French Hacker Arrested for Breaking into U.S. President’s Accoun.
Lane, T. and Brodley, C.E. (1997) Sequence Matching and Learning in Anomaly Detection for Computer Security. Proceedings of the AAAI Workshop on AI Approaches to Fraud Detection and Risk Management, AAAI Press, 43-49.
Alguliev, R.M. and Abdullayeva, F.C. (2013) Identity Management Based Security Architecture of Cloud Computing on Multi-Agent Systems. Proceedings of the Third International Conference on Innovative Computing Technology, London, 29-31 August, 123-126. http://dx.doi.org/10.1109/INTECH.2013.6653643
Coull, S.E., Branch, J., Szymanski, B. and Breimer, E. (2003) Intrusion Detection: A Bioinformatics Approach. Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, 8-12 December 24-33.
Stolfo, S.J., Salem, M.B. and Keromytis, A.D. (2012) Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud. Proceedings of the IEEE Symposium on Security and Privacy Workshops, San Francisco, 125-128.