원문정보
초록
영어
Distributed computing guarantees to on a very basic level change the way we utilize PCs and get to and store our own specific and business data. With these new registering and correspondences models develop new data security challenges. Existing information security structures, for instance, encryption have fizzled in imagining information theft strikes, particularly those executed by an insider to the cloud supplier. We propose a substitute methodology for securing information in the cloud utilizing adversarial mimic improvement. We screen data access in the cloud and perceive unpredictable data access outlines. Right when unapproved access is suspected and after that confirmed using test questions, we dispatch a disinformation strike by giving back a considerable measure of fake information to the attacker. This secures against the misuse of the customer's real data. Trials coordinated in a neighbor-hood archive setting give confirmation this technique may give unprecedented levels of customer data security in a Cloud space.
목차
1. Introduction
2. Related Work
2.1. Evidence for the Problem
2.2. User Behavior Profiling
2.3. Decoy Technology
2.4. Imitation Placement is Important
2.5. Combining the User Behavior Profiling and Decoy Technology
3. Support Vector Machines
3.1. One Class SVMs
4. Detecting Insider Attacks
4.1. Technical Controls
4.2. Effectiveness of a Pattern for Preventing Theft by Insiders
5. Conclusion
References