Illegal Access Detection in the Cloud Computing Environment

HTML  XML Download Download as PDF (Size: 743KB)  PP. 65-71  
DOI: 10.4236/jis.2014.52007    4,912 Downloads   8,568 Views  Citations

ABSTRACT

In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model. Here, first of all, the normal behavior of the user is formed in the shape of a cloud model, then these models are compared with each other by using the cosine similarity method and by applying the collaborative filtering method the deviations from the normal behavior are evaluated. If the deviation value is above than the threshold, the user who gained access to the system is evaluated as illegal, otherwise he is evaluated as a real user.

Share and Cite:

Alguliev, R. and Abdullaeva, F. (2014) Illegal Access Detection in the Cloud Computing Environment. Journal of Information Security, 5, 65-71. doi: 10.4236/jis.2014.52007.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.