|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
|
05 July 2023, Volume 38 Issue 3
|
|
|
Abstract
Secure authentication is essential in the cloud since anyone might attempt to enter into your account from anywhere on the internet. However, even after you've taken every precaution to secure it, someone may still gain access to your cloud administration layer, including the APIs that lead to the leakage of keys or accounts. Therefore, intrusion detection at the cloud layer, which is above the computing layer, is crucial. By implementing an authentication-based intrusion detection system, cloud computing platforms cannot only ensure that legidmate users are accessing resources and data on the cloud, also detect malicious activity that can cause leading cyber attacks, and other security incidents that can result in financial loss, reputational damage, and legal liabilities. To circumvent the above menthioned threats, this study proposed an Authentication Based Suspicious Behavior Detection System that to do intrusion detection at the cloud layer that explores the API. A knowledge-based (Kbase) dataset is used to detect the authentication phase allied attacks. Simulation practices of multiple cracking tasks demonstrate the applicability of the approach.
Keyword
#
PDF Download (click here)
|
|
|
|
|