UMP Institutional Repository

Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing

Mohanaad, Shakir and Asmidar, Abu Bakar and Younus, Yousoff and Mostafa, Al-Emran and Maytham, Hammood (2016) Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing. Journal of Theoretical and Applied Information Technology, 94 (2). pp. 415-427. ISSN 1992-8645 (print); 817-3195 (online)

[img]
Preview
PDF (Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing.pdf - Published Version

Download (88kB) | Preview
[img]
Preview
PDF (Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing)
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing.pdf - Published Version

Download (883kB) | Preview

Abstract

Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker "who don't have a password" is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of "Confidence Range ". The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm.

Item Type: Article
Uncontrolled Keywords: Information system security; Data Security; Hybrid Cloud computing; Confidence Range(CR); Data classification; Electronic Personal Synthesis Behavior(EPSB)
Subjects: Q Science > QA Mathematics > QA76 Computer software
Faculty/Division: Faculty of Computer System And Software Engineering
Depositing User: Mrs. Neng Sury Sulaiman
Date Deposited: 19 Jul 2017 03:05
Last Modified: 19 Jul 2017 03:05
URI: http://umpir.ump.edu.my/id/eprint/16640
Download Statistic: View Download Statistics

Actions (login required)

View Item View Item