• DocumentCode
    672154
  • Title

    Detecting a malicious insider in the cloud environment using sequential rule mining

  • Author

    Nkosi, Lucky ; Tarwireyi, Paul ; Adigun, Matthew O.

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Zululand, KwaDlangezwa, South Africa
  • fYear
    2013
  • fDate
    25-27 Nov. 2013
  • Firstpage
    1
  • Lastpage
    10
  • Abstract
    Cloud computing is a growing paradigm that offers a lot of benefits to cloud users. Despite the potential benefits that cloud computing could offer to business and individuals, security remains one of the growing concerns that are hindering the adoption of this paradigm. Researchers have identified and dealt with many security threats to cloud computing. However, insider threats still remain as one of the major concerns. Threats from malicious insiders are often listed as dangerous threats by many researchers. However, this threat has not received the attention it deserves because many organizations turn out to be extra careful about external threats than insider threats. This paper discusses an approach that can help in identifying insiders behaving in a malicious way, which may lead to an attack. A rule learning algorithm was used in learning the behavior pattern of users, in order to build user profiles. A Matching algorithm was then used to match the historical behavior of the user with the current behavior, in order to identify users that masquerade in the system as normal users. The obtained results show that it was possible to identify insiders that masquerade in the system by observing their behavior patterns.
  • Keywords
    cloud computing; data mining; learning (artificial intelligence); security of data; behavior patterns; cloud computing; cloud environment; external threats; insider threats; malicious insider detection; matching algorithm; organizations; rule learning algorithm; security threats; sequential rule mining; user profiles; Cloud computing; Data mining; Itemsets; Knowledge based systems; Monitoring; Pattern matching; Security; Cloud; Insider; Matching algorithm; Sequential rules;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Adaptive Science and Technology (ICAST), 2013 International Conference on
  • Conference_Location
    Pretoria
  • Type

    conf

  • DOI
    10.1109/ICASTech.2013.6707505
  • Filename
    6707505