Prevention of Insider Attacks by Integrating Behavior Analysis with Risk based Access Control Model to Protect Cloud

The most dangerous threats faced by organizations are insider attacks. Since insiders are aware of the underlying system, handling insider attack is a most deterring task. The volume of attacks posed by insiders on cloud is very much higher than the traditional systems, as the attack vector and scop...

Full description

Saved in:
Bibliographic Details
Published inProcedia computer science Vol. 54; pp. 157 - 166
Main Authors Babu, B. Mahesh, Bhanu, Mary Saira
Format Journal Article
LanguageEnglish
Published Elsevier B.V 2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The most dangerous threats faced by organizations are insider attacks. Since insiders are aware of the underlying system, handling insider attack is a most deterring task. The volume of attacks posed by insiders on cloud is very much higher than the traditional systems, as the attack vector and scope of the attack is high in cloud1. Insider attack affects the reputation and productivity of the organization and drags it into losses. Insiders may cause damage accidentally or intentionally. Proper management of privileges reduces the threats posed by insiders. So by properly managing privileges, insider threats can be reduced. This paper proposes a privilege management mechanism which manages the users by incorporating risk, trust into an access control mechanism to develop more scalable and flexible prevention mechanism against insider attacks.
ISSN:1877-0509
1877-0509
DOI:10.1016/j.procs.2015.06.018