Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices

dc.contributor.authorKambhampaty, Krishna Kanth
dc.date.accessioned2019-07-24T15:23:50Z
dc.date.available2019-07-24T15:23:50Z
dc.date.issued2019en_US
dc.description.abstractThere are a variety of communication mediums or devices for interaction. Users hop from one medium to another frequently. Though the increase in the number of devices brings convenience, it also raises security concerns. Provision of platform to users is as much important as its security. In this dissertation we propose a security approach that captures user behavior for identifying malicious activities. System users exhibit certain behavioral patterns while utilizing the resources. User behaviors such as device location, accessing certain files in a server, using a designated or specific user account etc. If this behavior is captured and compared with normal users’ behavior, anomalies can be detected. In our model, we have identified malicious users and have assigned trust value to each user accessing the system. When a user accesses new files on the servers that have not been previously accessed, accessing multiple accounts from the same device etc., these users are considered suspicious. If this behavior continues, they are categorized as ingenuine. A trust value is assigned to users. This value determines the trustworthiness of a user. Genuine users get higher trust value and ingenuine users get a lower trust value. The range of trust value varies from zero to one, with one being the highest trustworthiness and zero being the lowest. In our model, we have sixteen different features to track user behavior. These features evaluate users’ activities. From the time users’ log in to the system till they log out, users are monitored based on these sixteen features. These features determine whether the user is malicious. For instance, features such as accessing too many accounts, using proxy servers, too many incorrect logins attribute to suspicious activity. Higher the number of these features, more suspicious is the user. More such additional features contribute to lower trust value. Identifying malicious users could prevent and/or mitigate the attacks. This will enable in taking timely action against these users from performing any unauthorized or illegal actions. This could prevent insider and masquerade attacks. This application could be utilized in mobile, cloud and pervasive computing platforms.en_US
dc.identifier.orcid0000-0002-1042-5673
dc.identifier.urihttps://hdl.handle.net/10365/29914
dc.publisherNorth Dakota State Universityen_US
dc.rightsNDSU Policy 190.6.2
dc.rights.urihttps://www.ndsu.edu/fileadmin/policy/190.pdf
dc.subjectcloud computingen_US
dc.subjectcyber attacksen_US
dc.subjectcybersecurityen_US
dc.subjectmachine learningen_US
dc.subjectnetwork securityen_US
dc.subjectuser behavior trusten_US
dc.titleDetecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devicesen_US
dc.typeDissertationen_US
dc.typeVideoen_US
ndsu.advisorNygard, Kendall
ndsu.collegeEngineeringen_US
ndsu.degreeDoctor of Philosophy (PhD)en_US
ndsu.departmentComputer Scienceen_US
ndsu.programComputer Scienceen_US

Files

Original bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices.pdf
Size:
1.72 MB
Format:
Adobe Portable Document Format
Description:
Detecting Insider and Masquerade Attacks by Identifying Malicious User Behavior and Evaluating Trust in Cloud Computing and IoT Devices
No Thumbnail Available
Name:
Krishna Kambhampaty video.mp4
Size:
101.54 MB
Format:
Mp4
Description:

License bundle

Now showing 1 - 2 of 2
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed to upon submission
Description:
No Thumbnail Available
Name:
Krishna Kambhampaty release form.pdf
Size:
191.08 KB
Format:
Adobe Portable Document Format
Description: