Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud

Threat-Path Estimate-Based Watchword-Chunk Algorithm for Advanced Persistent Threat in the Cloud

Babu Pandipati, Praveen Sam R.
Copyright: © 2022 |Pages: 32
DOI: 10.4018/IJWSR.299021
Article PDF Download
Open access articles are freely available for download

Abstract

In cloud computing, an advanced persistent threat (APT) is a cyber-attack that gains access to a network and remains undetected for some time. As well APTs have proven difficult to detect and protect, in the existing system they fail to analyze the path of an outbreak when the monitor and assign a weight to the nodes. If a path for an outbreak is detected the VM is migrated to hosts that do not account for the overloaded problem and underutilized hosts. In addition to the size of resources occupied by the VM thus here the traffic was increased. This paper proposes the Threat-Path Reckon technique that detects the multiple paths through re-identification and the addition of automatic weight for its neighbor nodes. Based on that weighted paths, the Secured Object Emigration technique invokes a mapping function to migrate the VMs. Finally, the data in the VM are stored in a best-fit distribution, thus it provides security but achieves the search overheads.
Article Preview
Top

Introduction

The recent boom in the development of Cloud Computing (CC) technology has caused a similar boom in hacker attack methods which is being constantly updated. Industries as well as government, now face more serious threats to information security (Vines, Krutz, (2010)). The threat to information from advanced persistent threat (APT) is much greater than that from independent hackers and poses an enormous challenge to network information security systems. Among the important characteristics of APT is that it is advanced and intrusion is at a very high level. It also has a strong shielding ability and the attack path is often indiscernible and this makes it more difficult for traditional methods to detect and put up a defense (Sabahi, (2011)). It is also persistent, the attack is continuous and of long duration, this also makes it difficult for single, point-based detection techniques to handle. Although APT’s carrier exists in big data, it brings a series of difficulties to APT detection and protection, but it can also use big data to test and respond to APT (Che, Duan, et al., (2011)). If there is comprehensive information data at all levels and stages, and any interactive behavior is detected, different data can be used to find different stages for APT analysis.

APT is a major attack model that goes on for a long time, involves a large amount of data traffic, and is multi-faceted (Shaikh, Haider, (2011)). This mode of attack presents major hurdles to which traditional single-point feature matching detection can hardly put up serious and effective resistance. In the traditional data storage model, the enterprise needs to build and manage a server, storage modules, communication devices, and human resources. On the contrary, multi-cloud storage provides customers with more flexibility, scalability, and convenience in low-speed data storage, based on memory requirements, rather than on how to create and maintain storage. It is, therefore, necessary to develop an efficient method for secure data sharing in multi-cloud storage (Bisong, Rahman, (2011)).

One of the best solutions to reduce data risks in multi-cloud storage is the parallel use of many clouds. Several researchers have developed several models using multi-cloud storage services. They differ in file cutting and distribution and cryptographic techniques used. On the other hand, the TPA might be dishonest and turn into an adversary (Heiser, Nicolett, (2008)). As a result, the malicious position of the TPA may cause significant harm by sharing the sensitive and private data of the CC with unauthorized parties and altering the privacy of the CC in order to obtain financial gains and other benefits (Paquette, Jaeger, et al., (2010)). Therefore, to preserve the privacy of the CC, we need to be able to detect whether the TPA plays a dishonest role while conducting the audit of confidential information and private data of the CC. Several existing guidelines are available in the literature to keep the TPA's potential malicious activities reviewed and controlled (Agarwal, Agarwal, (2011)). Similarly, an analytical model-based approach for quality evaluation of infrastructure-as-a-service cloud is presented in (Xia, Yunni, et al., (2013)). In those existing protocols, however, computational and communication overheads are not addressed in full, leaving room for possible malicious activities from the TPA. Therefore, a lightweight protocol is required to protect the privacy of the CC and to detect the malicious activities of the TPA, if any (Chou, (2013)).

Complete Article List

Search this Journal:
Reset
Volume 21: 1 Issue (2024)
Volume 20: 1 Issue (2023)
Volume 19: 4 Issues (2022): 1 Released, 3 Forthcoming
Volume 18: 4 Issues (2021)
Volume 17: 4 Issues (2020)
Volume 16: 4 Issues (2019)
Volume 15: 4 Issues (2018)
Volume 14: 4 Issues (2017)
Volume 13: 4 Issues (2016)
Volume 12: 4 Issues (2015)
Volume 11: 4 Issues (2014)
Volume 10: 4 Issues (2013)
Volume 9: 4 Issues (2012)
Volume 8: 4 Issues (2011)
Volume 7: 4 Issues (2010)
Volume 6: 4 Issues (2009)
Volume 5: 4 Issues (2008)
Volume 4: 4 Issues (2007)
Volume 3: 4 Issues (2006)
Volume 2: 4 Issues (2005)
Volume 1: 4 Issues (2004)
View Complete Journal Contents Listing