Analysis of Insiders Attack Mitigation Strategies

作者: Zulkefli Mohd Yusop , Jemal H. Abawajy

DOI: 10.1016/J.SBSPRO.2014.06.002

关键词:

摘要: Insider threat has become a serious information security issues within organizations. In this paper, we analyze the problem of insider threats with emphases on Cloud computing platform. Security is one major anxieties when planning to adopt Cloud. This paper will contribute towards conception mitigation strategies that can be relied solve malicious threats. While relieves organizations from burden data management and storage costs, in general particular main concern cloud environments. We analyses existing reduce insiders computing.

参考文章(28)
Cyril Onwubiko, Security Issues to Cloud Computing ieee international conference on cloud computing technology and science. pp. 271- 288 ,(2010) , 10.1007/978-1-84996-241-4_16
Qussai Yaseen, Brajendra Panda, Predicting and preventing insider threat in relational database systems workshop in information security theory and practice. pp. 368- 383 ,(2010) , 10.1007/978-3-642-12368-9_30
Habibollah Haron, Ngoc Thanh Nguyen, Ali Selamat, Intelligent Information and Database Systems ,(2011)
Qussai Yaseen, Brajendra Panda, Enhanced insider threat detection model that increases data availability international conference on distributed computing and internet technology. pp. 267- 277 ,(2011) , 10.1007/978-3-642-19056-8_20
Qingfeng Chen, Yi-Ping Phoebe Chen, Shichao Zhang, Chengqi Zhang, Detecting Collusion Attacks in Security Protocols Frontiers of WWW Research and Development - APWeb 2006. ,vol. 3841, pp. 297- 306 ,(2006) , 10.1007/11610113_27
Jung-Ho Eom, Seon-Ho Park, Tai-Myoung Chung, Min-Woo Park, A framework of defense system for prevention of insider's malicious behaviors international conference on advanced communication technology. pp. 982- 987 ,(2011)
Ainul Azila Che Fauzi, Ahmad Noraziah, Tutut Herawan, Noriyani Mohd. Zin, None, On Cloud Computing Security Issues Intelligent Information and Database Systems. pp. 560- 569 ,(2012) , 10.1007/978-3-642-28490-8_58
Chia-Mei Chen, D.J. Guan, Yu-Zhi Huang, Ya-Hui Ou, Attack Sequence Detection in Cloud Using Hidden Markov Model information security. pp. 100- 103 ,(2012) , 10.1109/ASIAJCIS.2012.24
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, None, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems. ,vol. 25, pp. 599- 616 ,(2009) , 10.1016/J.FUTURE.2008.12.001
Sudharsan Sundararajan, Hari Narayanan, Vipin Pavithran, Kaladhar Vorungati, Krishnashree Achuthan, Preventing Insider Attacks in the Cloud Advances in Computing and Communications. pp. 488- 500 ,(2011) , 10.1007/978-3-642-22709-7_48