SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Ethics in Engineering & Management Education 
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 
MIST Effective Masquerade Attack Detection in 
the Cloud 
Tallapaneni Madhavi 
M.Tech Scholar (CSE) 
Dept. of CSE 
Prakasam Engineering College 
AP, India 
43 
Abstract: Cloud computing promises to significantly change the 
way we use computers and access and store our personal and 
business information. With these new computing and 
communications paradigms arise new data security challenges. 
Existing data protection mechanisms such as encryption have 
failed in preventing data theft attacks, especially those 
perpetrated by an insider to the cloud provider. We propose a 
different approach for securing data in the cloud using offensive 
decoy technology. We monitor data access in the cloud and detect 
abnormal data access patterns. When unauthorized access is 
suspected and then verified using challenge questions, we launch 
a disinformation attack by returning large amounts of decoy 
information to the attacker. This protects against the misuse of 
the user’s real data. Experiments conducted in a local file setting 
provide evidence that this approach may provide unprecedented 
levels of user data security in a Cloud environment. 
Keywords: Mist, Insider data stealing, Bait information, Lure 
Files, Validating user 
I. INTRODUCTION 
In this paper, we address a novel approach to securing 
personal and business data in the Cloud. We propose 
monitoring data access patterns by profiling user behavior to 
determine if and when a malicious insider illegitimately 
accesses someone’s documents in a Cloud service. Decoy 
documents stored in the Cloud alongside the user’s real data 
also serve as sensors to detect illegitimate access. Once 
unauthorized data access or exposure is suspected, and later 
verified, with challenge questions for instance, we inundate 
the malicious insider with bogus information in order to dilute 
the user’s real data. Such preventive attacks that rely on 
disinformation technology could provide unprecedented levels 
of security in the Cloud and in social networks. If a valid 
user’s credentials are stolen by an attacker, the attacker can 
enter into the cloud as a valid user. Distinguishing the valid 
user and the attacker (the user, who is doing identity crime). 
Protecting the real user’s sensitive data on the cloud from the 
attacker (insider data theft attacker). Platforms will not show 
the complexity and details of the underlying infrastructure 
from users and applications by providing very simple 
graphical interface or API (Applications Programming 
Interface Cloud computing is a type of the use or operation of 
computers that relies on sharing computing resources rather 
than having local servers or personal devices to handle 
applications. 
Businesses, especially startups small talks, small and medium 
businesses (SMBs), are increasingly opting for outsourcing 
data and the action of mathematical calculation to the Cloud. 
Data theft attacks are increase the volume of the attacker is a 
intended to do harm insider. This is considered as one of the 
top effective threats to cloud computing by the Cloud privacy 
Alliance. While most Cloud computing users are well-aware 
of this effective threat, they are left only with trusting the 
service provider when it comes to protect their data. The lack 
of temporary information into, let alone constraints over, the 
Cloud provider authentication, authorization, and audit 
controls only make worse with this threat. 
Existing data protection mechanisms such as 
encryption have failed in preventing data theft attacks, 
especially those perpetrated by an insider to the cloud 
provider. Much research in Cloud computing security has 
focused on ways of preventing unauthorized and illegitimate 
access to data by developing sophisticated access control and 
encryption mechanisms. However these mechanisms have not 
been able to prevent data compromise. 
2. LITERATURE SURVEY 
Top Threats to Cloud Computing 
Cloud Computing represents one of the most significant shifts 
in information technology many of us are likely to see in our 
lifetimes. Reaching the point where computing functions as a 
utility has great potential, promising innovations we cannot 
yet imagine. Customers are both excited and nervous at the 
prospects of Cloud Computing. They are excited by the 
opportunities to reduce capital costs. They are excited for a 
chance to divest them of infrastructure management, and focus 
on core competencies. Most of all, they are excited by the 
agility offered by the on-demand provisioning of computing 
and the ability to align information technology with business 
strategies and needs more readily. However, customers are 
also very concerned about the risks of Cloud Computing if not 
properly secured, and the loss of direct control over systems 
for which they are nonetheless accountable. To aid both cloud 
customers and cloud providers, CSA developed “Security 
Guidance for Critical Areas in Cloud Computing”, initially 
released in April 2009, and revised in December 2009. This 
guidance has quickly become the industry standard catalogue 
of best practices to secure Cloud Computing, consistently
International Journal of Ethics in Engineering & Management Education 
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 
44 
lauded for its comprehensive approach to the problem, across 
13 domains of concern. Numerous organizations around the 
world are incorporating the guidance to manage their cloud 
strategies. 
The great breadth of recommendations provided by CSA 
guidance creates an implied responsibility for the reader. Not 
all recommendations are applicable to all uses of Cloud 
Computing. Some cloud services host customer information of 
very low sensitivity, while others represent mission critical 
business functions. Some cloud applications contain regulated 
personal information, while others instead provide cloud-based 
protection against external threats. It is incumbent upon 
the cloud customer to understand the organizational value of 
the system they seek to move into the cloud. Ultimately, CSA 
guidance must be applied within the context of the business 
mission, risks, rewards, and cloud threat environment using 
sound risk management practices. 
Top Threats to Cloud Computing, is to provide needed 
context to assist organizations in making educated risk 
management decisions regarding their cloud adoption 
strategies. In essence, this threat research document should be 
seen as a companion to “Security Guidance for Critical Areas 
in Cloud Computing”. As the first deliverable in the CSA’s 
Cloud Threat Initiative, the “Top Threats” document will be 
updated regularly to reflect expert consensus on the probable 
threats which customers should be concerned about. There has 
been much debate about what is “in scope” for this research. 
We expect this debate to continue and for future versions of 
“Top Threats to Cloud Computing” to reflect the consensus 
emerging from those debates. While many issues, such as 
provider financial stability, create significant risks to 
customers, we have tried to focus on issues we feel are either 
unique to or greatly amplified by the key characteristics of 
Cloud Computing and its shared, on-demand nature. We 
identify the following threats in our initial document: 
· Abuse and Nefarious Use of Cloud Computing 
· Insecure Application Programming Interfaces 
· Malicious Insiders 
· Shared Technology Vulnerabilities 
· Data Loss/Leakage 
· Account, Service & Traffic Hijacking 
· Unknown Risk Profile 
Our goal is to provide a threat identification deliverable that 
can be quickly updated to reflect the dynamics of Cloud 
Computing and its rapidly evolving threat environment. We 
look forward to your participation on subsequent versions of 
“Top Threats to Cloud Computing”, as we continue to refine 
our list of threats, and to your input as we all figure out how to 
secure Cloud Computing. 
Threat #1: Abuse and Nefarious Use of Cloud Computing 
IaaS providers offer their customers the illusion of unlimited 
compute, network, and storage capacity — often coupled with 
a ‘frictionless’ registration process where anyone with a valid 
credit card can register and immediately begin using cloud 
services. Some providers even offer free limited trial periods. 
By abusing the relative anonymity behind these registration 
and usage models, spammers, malicious code authors, and 
other criminals have been able to conduct their activities with 
relative impunity. PaaS providers have traditionally suffered 
most from this kind of attacks; however, recent evidence 
shows that hackers have begun to target IaaS vendors as well. 
Future areas of concern include password and key cracking, 
DDOS, launching dynamic attack points, hosting malicious 
data, botnet command and control, building rainbow tables, 
and CAPTCHA solving farms. 
Threat #2: Insecure Interfaces and APIs 
Cloud Computing providers expose a set of software 
interfaces or APIs that customers use to manage and interact 
with cloud services. Provisioning, management, orchestration, 
and monitoring are all performed using these interfaces. The 
security and availability of general cloud services is dependent 
upon the security of these basic APIs. From authentication and 
access control to encryption and activity monitoring, these 
interfaces must be designed to protect against both accidental 
and malicious attempts to circumvent policy. Furthermore, 
organizations and third parties often build upon these 
interfaces to offer value-added services to their customers. 
This introduces the complexity of the new layered API; it also 
increases risk, as organizations may be required to relinquish 
their credentials to third parties in order to enable their agency. 
Threat #3: Malicious Insiders 
The threat of a malicious insider is well-known to most 
organizations. This threat is amplified for consumers of cloud 
services by the convergence of IT services and customers 
under a single management domain, combined with a general 
lack of transparency into provider process and procedure. For 
example, a provider may not reveal how it grants employees 
access to physical and virtual assets, how it monitors these 
employees, or how it analyzes and reports on policy 
compliance. To complicate matters, there is often little or no 
visibility into the hiring standards and practices for cloud 
employees. This kind of situation clearly creates an attractive 
opportunity for an adversary — ranging from the hobbyist 
hacker, to organized crime, to corporate espionage, or even 
nation-state sponsored intrusion. The level of access granted 
could enable such an adversary to harvest confidential data or 
gain complete control over the cloud services with little or no 
risk of detection. 
3. PROPOSED SYSTEM 
We propose a completely different approach to securing the 
cloud using decoy information technology, that we have come 
to call Fog computing. We use this technology to launch 
disinformation attacks against malicious insiders, preventing 
them from distinguishing the real sensitive customer data from
International Journal of Ethics in Engineering & Management Education 
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 
45 
fake worthless data. The decoys, then, serve two purposes: (1) 
validating whether data access is authorized 
when abnormal information access is detected, and (2) 
confusing the attacker with bogus information. 
MODULE DESCRIPTION: 
1. Cloud Computing. 
2. User Behavior Profiling: 
3. Decoy documents. 
1. Cloud computing: Cloud computing is a model for enabling 
convenient, on demand network access to a shared pool of 
configurable computing resources (for example, networks, 
servers, storage, applications, and services) that can be rapidly 
provisioned and released with minimal management effort or 
service-provider interaction. It divides into three types 
1. Application as a service. 
2. Infrastructure as a service. 
3. Platform as a service. 
2. User Behavior Profiling: We monitor data access in the 
cloud and detect abnormal data access patterns User profiling 
is a well known Technique that can be applied here to model 
how, when, and how much a user accesses their information in 
the Cloud. Such ‘normal user’ behavior can be continuously 
checked to determine whether abnormal access to a user’s 
information is occurring. This method of behavior-based 
security is commonly used in fraud detection applications. 
Such profiles would naturally include volumetric information, 
how many documents are typically read and how often. We 
monitor for abnormal search behaviors that exhibit deviations 
from the user baseline the correlation of search behavior 
anomaly detection with trap-based decoy files should provide 
stronger evidence of malfeasance, and therefore improve a 
detector’s accuracy. 
3. Decoy documents: We propose a different approach for 
securing data in thecloud using offensive decoy technology. 
We monitor data access in the cloud and detect abnormal data 
access patterns. we launch a disinformation attack by returning 
large amounts of decoy information to the attacker. This 
protects against the misuse of the user’s real data. We use this 
technology to launch disinformation attacks against malicious 
insiders, preventing them from distinguishing the real 
sensitive customer data from fake worthless data the decoys, 
then, serve two purposes: 
(1) Validating whether data access is authorized when 
abnormal information access is detected, and 
(2) Confusing the attacker with bogus information.. 
4. IMPLEMENTATION 
Figure 1 System Architecture 
Figure.2. AUC Comparison by user 
4.1. System Modules 
User Access Behavior Profiling: It is expected that access to a 
user’s information in the Cloud will exhibit a normal means of 
access. User profiling is a well known technique that can be 
applied here to model how, when, and how much a user 
accesses their information in the Cloud. Such ‘normal user’ 
behavior can be continuously checked to determine whether 
abnormal access to a user’s information is occurring. This 
method of behavior-based security is commonly used in fraud 
detection applications. Such profiles would naturally include 
volumetric information, how many documents are typically 
read and how often. These simple user specific features can 
serve to detect abnormal Cloud access based partially upon the 
scale and scope of data transferred. 
Decoy File System Maintenance: Decoy information, such as 
decoy documents, honeyfiles, honeypots, and various other 
bogus information can be generated on demand and serve as a 
means of detecting unauthorized access to information and to
International Journal of Ethics in Engineering & Management Education 
Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 
46 
‘poison’ the thief’s ex-filtrated information. Serving decoys 
will confound and confuse an adversary into believing they 
have ex-filtrated useful information, when they have not. This 
technology may be integrated with user behavior profiling 
technology to secure a user’s information in the Cloud. 
Whenever abnormal access to a cloud service is noticed, 
decoy information may be returned by the Cloud and delivered 
in such a way as to appear completely legitimate and normal. 
The true user, who is the owner of the information, would 
readily identify when decoy information is being returned by 
the Cloud, and hence could alter the Cloud’s responses 
through a variety of means, such as challenge questions, to 
inform the Cloud security system that it has inaccurately 
detected an unauthorized access. In the case where the access 
is correctly identified as an unauthorized access, the Cloud 
security system would deliver unbounded amounts of bogus 
information to the adversary, thus securing the user’s true data 
from unauthorized disclosure. The decoys, then, serve two 
purposes: (1) validating whether data access is authorized 
when abnormal information access is detected, and (2) 
confusing the attacker with bogus information. 
Anomaly Detection: The correlation of search behavior 
anomaly detection with trap-based decoy files should provide 
stronger evidence of malfeasance, and therefore improve a 
detector’s accuracy. We hypothesize that detecting abnormal 
search operations performed prior to an unsuspecting user 
opening a decoy file will corroborate the suspicion that the 
user is indeed impersonating another victim user. This 
scenario covers the threat model of illegitimate access to 
Cloud data. Furthermore, an accidental opening of a decoy file 
by a legitimate user might be recognized as an accident if the 
search behavior is not deemed abnormal. In other words, 
detecting abnormal search and decoy traps together may make 
a very effective masquerade detection system. Combining the 
two techniques improves detection accuracy. 
We use decoys as an oracle for validating the alerts issued by 
the sensor monitoring the user’s file search and access 
behavior. In our experiments, we did not generate the decoys 
on demand at the time of detection when the alert was issued. 
Instead, we made sure that the decoys were conspicuous 
enough for the attacker to access them if they were indeed 
trying to steal information by placing them in highly 
conspicuous directories and by giving them enticing names. 
With this approach, we were able to improve the accuracy of 
our detector. Crafting the decoys on demand improves the 
accuracy of the detector even further. Combining the two 
techniques, and having the decoy documents act as an oracle 
for our detector when abnormal user behavior is detected may 
lower the overall false positive rate of detector. 
Challenge Requests: If the current user’s behavior seems 
anomalous, then the user is asked for randomly selected secret 
questions. If the user fails to provide correct answers for a 
certain limits or threshold, the user is provided with decoy 
files. If the user provided correct answers for a limit, the user 
is treated as normal user. 
5. CONCLUSION 
We present a novel approach to securing personal and 
business data in the Cloud. We propose monitoring data 
access patterns by profiling user behavior to determine if and 
when a malicious insider illegitimately accesses someone’s 
documents in a Cloud service. Decoy documents stored in the 
Cloud alongside the user’s real data also serve as sensors to 
detect illegitimate access. Once unauthorized data access or 
exposure is suspected, and later verified, with challenge 
questions for instance, we inundate the malicious insider with 
bogus information in order to dilute the user’s real data. Such 
preventive attacks that rely on disinformation technology , 
could provide unprecedented levels of security in the Cloud 
and in social networks model. 
REFERENCES 
[1]. Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” 
March 2010. [Online]. Available: 
https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf 
[2]. M. Arrington, “In our inbox: Hundreds of confidential twitter 
documents,” July 2009. [Online]. Available: 
http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential- 
twitter-documents/ 
[3]. D. Takahashi, “French hacker who leaked Twitter documents to 
TechCrunch is busted,” March 2010. [Online]. Available: 
http://venturebeat.com/2010/03/24/french-hacker-wholeaked- twitter-documents- 
to-techcrunch-is-busted/ 
[4]. D. Danchev, “ZDNET: french hacker gains access to twitter’s admin 
panel,” April 2009. [Online]. Available: 
http://www.zdnet.com/blog/security/french-hacker-gains-access-totwitters- 
admin-panel/3292 
[5]. P. Allen, “Obama’s Twitter password revealed after french hacker 
arrested for breaking into U.S. president’s account,” March 2010. 
[Online]. Available: http://www.dailymail.co.uk/news/article- 
1260488/Barack- Obamas-Twitter-password-revealed-French-hacker-arrested. 
html 
[6]. F. Rocha and M. Correia, “Lucy in the sky without diamonds: Stealing 
confidential data in the cloud,” in Proceedings of the First International 
Workshop on Dependability of Clouds, Data Centers and Virtual 
Computing Environments, Hong Kong, ser. DCDV ’11, June 2011. 
[7]. M. Van Dijk and A. Juels, “On the impossibility of cryptography alone 
for privacy-preserving cloud computing,” in Proceedings of the 5th 
USENIX conference on Hot topics in security, ser. HotSec’10. 
Berkeley, CA, USA: USENIX Association, 2010, pp. 1–8. [Online]. 
Available: http://dl.acm.org/citation.cfm?id=1924931.1924934 
[8]. J. Pepitone, “Dropbox’s password nightmare highlights cloud risks,” 
June 2011. 
[9]. M. Ben-Salem and S. J. Stolfo, “Modeling user search-behavior for 
masquerade detection,” in Proceedings of the 14th International 
Symposium on Recent Advances in Intrusion Detection. Heidelberg: 
Springer, September 2011, pp. 1–20. 
[10]. B. M. Bowen and S. Hershkop, “Decoy Document Distributor: 
http://sneakers.cs.columbia.edu/ids/fog/,” 2009. [Online]. Available: 
http://sneakers.cs.columbia.edu/ids/FOG/

More Related Content

What's hot

KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperMartin Ruubel
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Martin Ruubel
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trendsChristopher Bennett
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkIOSR Journals
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingIRJET Journal
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperMartin Ruubel
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalCMR WORLD TECH
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudcloudresearcher
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm IJECEIAES
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computingMd. Hasibur Rashid
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security IssuesStelios Krasadakis
 
Abuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_AshwinAbuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_AshwinAshwin Palani
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...Editor IJMTER
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enoughEMC
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 

What's hot (19)

Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime WhitepaperKSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
KSI for IoT Security - Turning Defence Into Offence - Guardtime Whitepaper
 
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
Guardtime_KSI_Use_of_a_globally_distributed_blockchain_to_secure_SDN_whitepap...
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
br-security-connected-top-5-trends
br-security-connected-top-5-trendsbr-security-connected-top-5-trends
br-security-connected-top-5-trends
 
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure FrameworkSecurity and Privacy Issues of Cloud Computing; Solutions and Secure Framework
Security and Privacy Issues of Cloud Computing; Solutions and Secure Framework
 
A Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud ComputingA Comparative Review on Data Security Challenges in Cloud Computing
A Comparative Review on Data Security Challenges in Cloud Computing
 
Attributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime WhitepaperAttributable Networks - Guardtime Whitepaper
Attributable Networks - Guardtime Whitepaper
 
Darktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digitalDarktrace enterprise immune system whitepaper_digital
Darktrace enterprise immune system whitepaper_digital
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Seven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloudSeven deadly threats and vulnerabilities in cloud
Seven deadly threats and vulnerabilities in cloud
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm Data loss prevention by using MRSH-v2 algorithm
Data loss prevention by using MRSH-v2 algorithm
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Abuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_AshwinAbuse_in_the_Cloud_Palani_Ashwin
Abuse_in_the_Cloud_Palani_Ashwin
 
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
OneTK: Key Distribution Center at Cloud Providers towards End to End, Securit...
 
Why Passwords are not strong enough
Why Passwords are not strong enoughWhy Passwords are not strong enough
Why Passwords are not strong enough
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 

Viewers also liked

Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader DetectionArquam Md
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GAChungHsiangHsueh
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention ToolsSplitty
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesYuji Kosuga
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detectionPiyu Karande
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiAyurvetAks
 
Cloud Computing Business Model
Cloud Computing Business ModelCloud Computing Business Model
Cloud Computing Business Modelippei_suzuki
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business ModelsKarri Huhtanen
 

Viewers also liked (8)

Masquerader Detection
Masquerader DetectionMasquerader Detection
Masquerader Detection
 
Intrusion detection system with GA
Intrusion detection system with GAIntrusion detection system with GA
Intrusion detection system with GA
 
626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools626 Information leakage and Data Loss Prevention Tools
626 Information leakage and Data Loss Prevention Tools
 
Automated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation VulnerabilitiesAutomated Detection of Session Fixation Vulnerabilities
Automated Detection of Session Fixation Vulnerabilities
 
Intrusiond and detection
Intrusiond and detectionIntrusiond and detection
Intrusiond and detection
 
Dr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhiDr.r.k.dhuria hydroponics aks, new delhi
Dr.r.k.dhuria hydroponics aks, new delhi
 
Cloud Computing Business Model
Cloud Computing Business ModelCloud Computing Business Model
Cloud Computing Business Model
 
Cloud Computing Business Models
Cloud Computing Business ModelsCloud Computing Business Models
Cloud Computing Business Models
 

Similar to MIST Effective Masquerade Attack Detection in the Cloud

Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIOSR Journals
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...csandit
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...cscpconf
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud ComputingMervat Bamiah
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computingijcnes
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptxMinnySkyy
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfTechugo
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...iosrjce
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environmentIaetsd Iaetsd
 

Similar to MIST Effective Masquerade Attack Detection in the Cloud (20)

A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 
B018211016
B018211016B018211016
B018211016
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...Design and implement a new cloud security method based on multi clouds on ope...
Design and implement a new cloud security method based on multi clouds on ope...
 
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
DESIGN AND IMPLEMENT A NEW CLOUD SECURITY METHOD BASED ON MULTI CLOUDS ON OPE...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Seven Deadly Threats and Vulnerabilities in Cloud Computing
Seven Deadly Threats and  Vulnerabilities in Cloud ComputingSeven Deadly Threats and  Vulnerabilities in Cloud Computing
Seven Deadly Threats and Vulnerabilities in Cloud Computing
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Challenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computingChallenges of IP protection in era of cloud computing
Challenges of IP protection in era of cloud computing
 
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud ComputingChallenges and Mechanisms for Securing Data in Mobile Cloud Computing
Challenges and Mechanisms for Securing Data in Mobile Cloud Computing
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
Cloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdfCloud Application Security Best Practices To follow.pdf
Cloud Application Security Best Practices To follow.pdf
 
J3602068071
J3602068071J3602068071
J3602068071
 
N017259396
N017259396N017259396
N017259396
 
Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...Internal & External Attacks in cloud computing Environment from confidentiali...
Internal & External Attacks in cloud computing Environment from confidentiali...
 
Iirdem a novel approach for enhancing security in multi cloud environment
Iirdem a novel approach for enhancing security in multi  cloud environmentIirdem a novel approach for enhancing security in multi  cloud environment
Iirdem a novel approach for enhancing security in multi cloud environment
 

More from Kumar Goud

Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkKumar Goud
 
Ijeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesIjeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesKumar Goud
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksKumar Goud
 
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsIjeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsKumar Goud
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingKumar Goud
 
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Kumar Goud
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Kumar Goud
 
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Kumar Goud
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Kumar Goud
 
layout impact of resolution enhancement in design for manufacturing dfm- in ...
layout impact of resolution enhancement in design for manufacturing  dfm- in ...layout impact of resolution enhancement in design for manufacturing  dfm- in ...
layout impact of resolution enhancement in design for manufacturing dfm- in ...Kumar Goud
 
a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...Kumar Goud
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...Kumar Goud
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...Kumar Goud
 
transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...Kumar Goud
 
go green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiago green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiaKumar Goud
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authenticationKumar Goud
 
enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...Kumar Goud
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureKumar Goud
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...Kumar Goud
 
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...Kumar Goud
 

More from Kumar Goud (20)

Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor networkIjeee 33-36-surveillance system for coal mines based on wireless sensor network
Ijeee 33-36-surveillance system for coal mines based on wireless sensor network
 
Ijeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission linesIjeee 28-32-accurate fault location estimation in transmission lines
Ijeee 28-32-accurate fault location estimation in transmission lines
 
Ijeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networksIjeee 24-27-energy efficient communication for adhoc networks
Ijeee 24-27-energy efficient communication for adhoc networks
 
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applicationsIjeee 20-23-target parameter estimation for pulsed doppler radar applications
Ijeee 20-23-target parameter estimation for pulsed doppler radar applications
 
Ijeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extractingIjeee 16-19-digital media hidden data extracting
Ijeee 16-19-digital media hidden data extracting
 
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
Ijeee 16-19-a novel approach to brain tumor classification using wavelet and ...
 
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
Ijeee 7-11-privacy preserving distributed data mining with anonymous id assig...
 
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...Ijeee 3-6-implementation of environment monitoring system using arm microcont...
Ijeee 3-6-implementation of environment monitoring system using arm microcont...
 
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
Ijeee 1-2-a tracking system using location prediction and dynamic threshold f...
 
layout impact of resolution enhancement in design for manufacturing dfm- in ...
layout impact of resolution enhancement in design for manufacturing  dfm- in ...layout impact of resolution enhancement in design for manufacturing  dfm- in ...
layout impact of resolution enhancement in design for manufacturing dfm- in ...
 
a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...a new power gating technique for mitigation of standby leakage power using vt...
a new power gating technique for mitigation of standby leakage power using vt...
 
hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...hardware implementation of aes encryption and decryption for low area & low p...
hardware implementation of aes encryption and decryption for low area & low p...
 
dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...dynamic resource allocation using virtual machines for cloud computing enviro...
dynamic resource allocation using virtual machines for cloud computing enviro...
 
transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...transient stability improvement in power system in multi machine system with ...
transient stability improvement in power system in multi machine system with ...
 
go green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in indiago green - green marketing its rise for an eco friendly processes in india
go green - green marketing its rise for an eco friendly processes in india
 
hand vein structure authentication
hand vein structure authenticationhand vein structure authentication
hand vein structure authentication
 
enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...enhancement of low power pulse triggered flip-flop design based on signal fee...
enhancement of low power pulse triggered flip-flop design based on signal fee...
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
 
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
professional fuzzy type-ahead rummage around in xml  type-ahead search techni...professional fuzzy type-ahead rummage around in xml  type-ahead search techni...
professional fuzzy type-ahead rummage around in xml type-ahead search techni...
 
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...Ijeee 58-61-assessment of raw milk quality by neural networking  n-n- model i...
Ijeee 58-61-assessment of raw milk quality by neural networking n-n- model i...
 

Recently uploaded

A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
Introduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxIntroduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxPavan Mohan Neelamraju
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CDHeadOfDepartmentComp1
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...KrishnaveniKrishnara1
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptxMel Paras
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...IJAEMSJORNAL
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxLina Kadam
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 

Recently uploaded (20)

A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
Introduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptxIntroduction to Machine Learning Part1.pptx
Introduction to Machine Learning Part1.pptx
 
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptxTriangulation survey (Basic Mine Surveying)_MI10412MI.pptx
Triangulation survey (Basic Mine Surveying)_MI10412MI.pptx
 
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
Stork Webinar | APM Transformational planning, Tool Selection & Performance T...
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
input buffering in lexical analysis in CD
input buffering in lexical analysis in CDinput buffering in lexical analysis in CD
input buffering in lexical analysis in CD
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
22CYT12 & Chemistry for Computer Systems_Unit-II-Corrosion & its Control Meth...
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx1- Practice occupational health and safety procedures.pptx
1- Practice occupational health and safety procedures.pptx
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
Guardians of E-Commerce: Harnessing NLP and Machine Learning Approaches for A...
 
AntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptxAntColonyOptimizationManetNetworkAODV.pptx
AntColonyOptimizationManetNetworkAODV.pptx
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 

MIST Effective Masquerade Attack Detection in the Cloud

  • 1. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) MIST Effective Masquerade Attack Detection in the Cloud Tallapaneni Madhavi M.Tech Scholar (CSE) Dept. of CSE Prakasam Engineering College AP, India 43 Abstract: Cloud computing promises to significantly change the way we use computers and access and store our personal and business information. With these new computing and communications paradigms arise new data security challenges. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. We propose a different approach for securing data in the cloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. When unauthorized access is suspected and then verified using challenge questions, we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. Experiments conducted in a local file setting provide evidence that this approach may provide unprecedented levels of user data security in a Cloud environment. Keywords: Mist, Insider data stealing, Bait information, Lure Files, Validating user I. INTRODUCTION In this paper, we address a novel approach to securing personal and business data in the Cloud. We propose monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, we inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology could provide unprecedented levels of security in the Cloud and in social networks. If a valid user’s credentials are stolen by an attacker, the attacker can enter into the cloud as a valid user. Distinguishing the valid user and the attacker (the user, who is doing identity crime). Protecting the real user’s sensitive data on the cloud from the attacker (insider data theft attacker). Platforms will not show the complexity and details of the underlying infrastructure from users and applications by providing very simple graphical interface or API (Applications Programming Interface Cloud computing is a type of the use or operation of computers that relies on sharing computing resources rather than having local servers or personal devices to handle applications. Businesses, especially startups small talks, small and medium businesses (SMBs), are increasingly opting for outsourcing data and the action of mathematical calculation to the Cloud. Data theft attacks are increase the volume of the attacker is a intended to do harm insider. This is considered as one of the top effective threats to cloud computing by the Cloud privacy Alliance. While most Cloud computing users are well-aware of this effective threat, they are left only with trusting the service provider when it comes to protect their data. The lack of temporary information into, let alone constraints over, the Cloud provider authentication, authorization, and audit controls only make worse with this threat. Existing data protection mechanisms such as encryption have failed in preventing data theft attacks, especially those perpetrated by an insider to the cloud provider. Much research in Cloud computing security has focused on ways of preventing unauthorized and illegitimate access to data by developing sophisticated access control and encryption mechanisms. However these mechanisms have not been able to prevent data compromise. 2. LITERATURE SURVEY Top Threats to Cloud Computing Cloud Computing represents one of the most significant shifts in information technology many of us are likely to see in our lifetimes. Reaching the point where computing functions as a utility has great potential, promising innovations we cannot yet imagine. Customers are both excited and nervous at the prospects of Cloud Computing. They are excited by the opportunities to reduce capital costs. They are excited for a chance to divest them of infrastructure management, and focus on core competencies. Most of all, they are excited by the agility offered by the on-demand provisioning of computing and the ability to align information technology with business strategies and needs more readily. However, customers are also very concerned about the risks of Cloud Computing if not properly secured, and the loss of direct control over systems for which they are nonetheless accountable. To aid both cloud customers and cloud providers, CSA developed “Security Guidance for Critical Areas in Cloud Computing”, initially released in April 2009, and revised in December 2009. This guidance has quickly become the industry standard catalogue of best practices to secure Cloud Computing, consistently
  • 2. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 44 lauded for its comprehensive approach to the problem, across 13 domains of concern. Numerous organizations around the world are incorporating the guidance to manage their cloud strategies. The great breadth of recommendations provided by CSA guidance creates an implied responsibility for the reader. Not all recommendations are applicable to all uses of Cloud Computing. Some cloud services host customer information of very low sensitivity, while others represent mission critical business functions. Some cloud applications contain regulated personal information, while others instead provide cloud-based protection against external threats. It is incumbent upon the cloud customer to understand the organizational value of the system they seek to move into the cloud. Ultimately, CSA guidance must be applied within the context of the business mission, risks, rewards, and cloud threat environment using sound risk management practices. Top Threats to Cloud Computing, is to provide needed context to assist organizations in making educated risk management decisions regarding their cloud adoption strategies. In essence, this threat research document should be seen as a companion to “Security Guidance for Critical Areas in Cloud Computing”. As the first deliverable in the CSA’s Cloud Threat Initiative, the “Top Threats” document will be updated regularly to reflect expert consensus on the probable threats which customers should be concerned about. There has been much debate about what is “in scope” for this research. We expect this debate to continue and for future versions of “Top Threats to Cloud Computing” to reflect the consensus emerging from those debates. While many issues, such as provider financial stability, create significant risks to customers, we have tried to focus on issues we feel are either unique to or greatly amplified by the key characteristics of Cloud Computing and its shared, on-demand nature. We identify the following threats in our initial document: · Abuse and Nefarious Use of Cloud Computing · Insecure Application Programming Interfaces · Malicious Insiders · Shared Technology Vulnerabilities · Data Loss/Leakage · Account, Service & Traffic Hijacking · Unknown Risk Profile Our goal is to provide a threat identification deliverable that can be quickly updated to reflect the dynamics of Cloud Computing and its rapidly evolving threat environment. We look forward to your participation on subsequent versions of “Top Threats to Cloud Computing”, as we continue to refine our list of threats, and to your input as we all figure out how to secure Cloud Computing. Threat #1: Abuse and Nefarious Use of Cloud Computing IaaS providers offer their customers the illusion of unlimited compute, network, and storage capacity — often coupled with a ‘frictionless’ registration process where anyone with a valid credit card can register and immediately begin using cloud services. Some providers even offer free limited trial periods. By abusing the relative anonymity behind these registration and usage models, spammers, malicious code authors, and other criminals have been able to conduct their activities with relative impunity. PaaS providers have traditionally suffered most from this kind of attacks; however, recent evidence shows that hackers have begun to target IaaS vendors as well. Future areas of concern include password and key cracking, DDOS, launching dynamic attack points, hosting malicious data, botnet command and control, building rainbow tables, and CAPTCHA solving farms. Threat #2: Insecure Interfaces and APIs Cloud Computing providers expose a set of software interfaces or APIs that customers use to manage and interact with cloud services. Provisioning, management, orchestration, and monitoring are all performed using these interfaces. The security and availability of general cloud services is dependent upon the security of these basic APIs. From authentication and access control to encryption and activity monitoring, these interfaces must be designed to protect against both accidental and malicious attempts to circumvent policy. Furthermore, organizations and third parties often build upon these interfaces to offer value-added services to their customers. This introduces the complexity of the new layered API; it also increases risk, as organizations may be required to relinquish their credentials to third parties in order to enable their agency. Threat #3: Malicious Insiders The threat of a malicious insider is well-known to most organizations. This threat is amplified for consumers of cloud services by the convergence of IT services and customers under a single management domain, combined with a general lack of transparency into provider process and procedure. For example, a provider may not reveal how it grants employees access to physical and virtual assets, how it monitors these employees, or how it analyzes and reports on policy compliance. To complicate matters, there is often little or no visibility into the hiring standards and practices for cloud employees. This kind of situation clearly creates an attractive opportunity for an adversary — ranging from the hobbyist hacker, to organized crime, to corporate espionage, or even nation-state sponsored intrusion. The level of access granted could enable such an adversary to harvest confidential data or gain complete control over the cloud services with little or no risk of detection. 3. PROPOSED SYSTEM We propose a completely different approach to securing the cloud using decoy information technology, that we have come to call Fog computing. We use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from
  • 3. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 45 fake worthless data. The decoys, then, serve two purposes: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker with bogus information. MODULE DESCRIPTION: 1. Cloud Computing. 2. User Behavior Profiling: 3. Decoy documents. 1. Cloud computing: Cloud computing is a model for enabling convenient, on demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service-provider interaction. It divides into three types 1. Application as a service. 2. Infrastructure as a service. 3. Platform as a service. 2. User Behavior Profiling: We monitor data access in the cloud and detect abnormal data access patterns User profiling is a well known Technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. This method of behavior-based security is commonly used in fraud detection applications. Such profiles would naturally include volumetric information, how many documents are typically read and how often. We monitor for abnormal search behaviors that exhibit deviations from the user baseline the correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector’s accuracy. 3. Decoy documents: We propose a different approach for securing data in thecloud using offensive decoy technology. We monitor data access in the cloud and detect abnormal data access patterns. we launch a disinformation attack by returning large amounts of decoy information to the attacker. This protects against the misuse of the user’s real data. We use this technology to launch disinformation attacks against malicious insiders, preventing them from distinguishing the real sensitive customer data from fake worthless data the decoys, then, serve two purposes: (1) Validating whether data access is authorized when abnormal information access is detected, and (2) Confusing the attacker with bogus information.. 4. IMPLEMENTATION Figure 1 System Architecture Figure.2. AUC Comparison by user 4.1. System Modules User Access Behavior Profiling: It is expected that access to a user’s information in the Cloud will exhibit a normal means of access. User profiling is a well known technique that can be applied here to model how, when, and how much a user accesses their information in the Cloud. Such ‘normal user’ behavior can be continuously checked to determine whether abnormal access to a user’s information is occurring. This method of behavior-based security is commonly used in fraud detection applications. Such profiles would naturally include volumetric information, how many documents are typically read and how often. These simple user specific features can serve to detect abnormal Cloud access based partially upon the scale and scope of data transferred. Decoy File System Maintenance: Decoy information, such as decoy documents, honeyfiles, honeypots, and various other bogus information can be generated on demand and serve as a means of detecting unauthorized access to information and to
  • 4. International Journal of Ethics in Engineering & Management Education Website: www.ijeee.in (ISSN: 2348-4748, Volume 1, Issue 10, October 2014) 46 ‘poison’ the thief’s ex-filtrated information. Serving decoys will confound and confuse an adversary into believing they have ex-filtrated useful information, when they have not. This technology may be integrated with user behavior profiling technology to secure a user’s information in the Cloud. Whenever abnormal access to a cloud service is noticed, decoy information may be returned by the Cloud and delivered in such a way as to appear completely legitimate and normal. The true user, who is the owner of the information, would readily identify when decoy information is being returned by the Cloud, and hence could alter the Cloud’s responses through a variety of means, such as challenge questions, to inform the Cloud security system that it has inaccurately detected an unauthorized access. In the case where the access is correctly identified as an unauthorized access, the Cloud security system would deliver unbounded amounts of bogus information to the adversary, thus securing the user’s true data from unauthorized disclosure. The decoys, then, serve two purposes: (1) validating whether data access is authorized when abnormal information access is detected, and (2) confusing the attacker with bogus information. Anomaly Detection: The correlation of search behavior anomaly detection with trap-based decoy files should provide stronger evidence of malfeasance, and therefore improve a detector’s accuracy. We hypothesize that detecting abnormal search operations performed prior to an unsuspecting user opening a decoy file will corroborate the suspicion that the user is indeed impersonating another victim user. This scenario covers the threat model of illegitimate access to Cloud data. Furthermore, an accidental opening of a decoy file by a legitimate user might be recognized as an accident if the search behavior is not deemed abnormal. In other words, detecting abnormal search and decoy traps together may make a very effective masquerade detection system. Combining the two techniques improves detection accuracy. We use decoys as an oracle for validating the alerts issued by the sensor monitoring the user’s file search and access behavior. In our experiments, we did not generate the decoys on demand at the time of detection when the alert was issued. Instead, we made sure that the decoys were conspicuous enough for the attacker to access them if they were indeed trying to steal information by placing them in highly conspicuous directories and by giving them enticing names. With this approach, we were able to improve the accuracy of our detector. Crafting the decoys on demand improves the accuracy of the detector even further. Combining the two techniques, and having the decoy documents act as an oracle for our detector when abnormal user behavior is detected may lower the overall false positive rate of detector. Challenge Requests: If the current user’s behavior seems anomalous, then the user is asked for randomly selected secret questions. If the user fails to provide correct answers for a certain limits or threshold, the user is provided with decoy files. If the user provided correct answers for a limit, the user is treated as normal user. 5. CONCLUSION We present a novel approach to securing personal and business data in the Cloud. We propose monitoring data access patterns by profiling user behavior to determine if and when a malicious insider illegitimately accesses someone’s documents in a Cloud service. Decoy documents stored in the Cloud alongside the user’s real data also serve as sensors to detect illegitimate access. Once unauthorized data access or exposure is suspected, and later verified, with challenge questions for instance, we inundate the malicious insider with bogus information in order to dilute the user’s real data. Such preventive attacks that rely on disinformation technology , could provide unprecedented levels of security in the Cloud and in social networks model. REFERENCES [1]. Cloud Security Alliance, “Top Threat to Cloud Computing V1.0,” March 2010. [Online]. Available: https://cloudsecurityalliance.org/topthreats/csathreats.v1.0.pdf [2]. M. Arrington, “In our inbox: Hundreds of confidential twitter documents,” July 2009. [Online]. Available: http://techcrunch.com/2009/07/14/in-our-inbox-hundreds-ofconfidential- twitter-documents/ [3]. D. Takahashi, “French hacker who leaked Twitter documents to TechCrunch is busted,” March 2010. [Online]. Available: http://venturebeat.com/2010/03/24/french-hacker-wholeaked- twitter-documents- to-techcrunch-is-busted/ [4]. D. Danchev, “ZDNET: french hacker gains access to twitter’s admin panel,” April 2009. [Online]. Available: http://www.zdnet.com/blog/security/french-hacker-gains-access-totwitters- admin-panel/3292 [5]. P. Allen, “Obama’s Twitter password revealed after french hacker arrested for breaking into U.S. president’s account,” March 2010. [Online]. Available: http://www.dailymail.co.uk/news/article- 1260488/Barack- Obamas-Twitter-password-revealed-French-hacker-arrested. html [6]. F. Rocha and M. Correia, “Lucy in the sky without diamonds: Stealing confidential data in the cloud,” in Proceedings of the First International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments, Hong Kong, ser. DCDV ’11, June 2011. [7]. M. Van Dijk and A. Juels, “On the impossibility of cryptography alone for privacy-preserving cloud computing,” in Proceedings of the 5th USENIX conference on Hot topics in security, ser. HotSec’10. Berkeley, CA, USA: USENIX Association, 2010, pp. 1–8. [Online]. Available: http://dl.acm.org/citation.cfm?id=1924931.1924934 [8]. J. Pepitone, “Dropbox’s password nightmare highlights cloud risks,” June 2011. [9]. M. Ben-Salem and S. J. Stolfo, “Modeling user search-behavior for masquerade detection,” in Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection. Heidelberg: Springer, September 2011, pp. 1–20. [10]. B. M. Bowen and S. Hershkop, “Decoy Document Distributor: http://sneakers.cs.columbia.edu/ids/fog/,” 2009. [Online]. Available: http://sneakers.cs.columbia.edu/ids/FOG/