• P-ISSN 0974-6846 E-ISSN 0974-5645

Indian Journal of Science and Technology


Indian Journal of Science and Technology

Year: 2015, Volume: 8, Issue: 28, Pages: 1-9

Original Article

Intelligence based Defense System to Protect from Advanced Persistent Threat by means of Social Engineering on Social Cloud Platform


Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social cloud against risks, threats and attacks. In this paper we discussed the policies and procedures of vulnerability management and intrusion detection system. We also focused on the steps involved in defense in depth system a layered architecture for prevention and protection from malicious users, masquerader and intruders. Where each layer restricts the intruder with deployed activities such as security monitoring, malicious site filtering, patches to remedy vulnerabilities, analysis of audit log files, Intrusion detection and prevention system and storage media management for protecting the cloud from advanced persistent threat. The different intrusion techniques using social engineering methods such as spear phishing or whale phishing are also discussed. A mathematical approach is given to secure the cloud computing using computational intelligence which is aimed to defense the attacks using Perron-Frobenius theorem and methods for public social network. In this paper we focused on the Defense in Depth model for a security layered strategy. We also discussed on the issues an audit communication or challenge to the cloud server data security. Defense System is the process of monitoring for and identifying unauthorized system access or manipulation and protecting the data from intruders. A clear description is given regarding the steps involved in the Advanced Persistent Attack and the measures or steps involved in Advanced Persistent Attack Defense System. The impact of security and privacy on cloud performance is calculated using cloud-sim tool, which supports simulating and modeling a large scale cloud infrastructure. An Experiment on intelligence based defense system using cloud analyst and simulator is given along with the result and conclusion.
Keywords: Advanced Persistent Attack, Cloud Computing, Cloud Security, Cloud Server, Defense in Depth, Defense System, Vulnerability


Subscribe now for latest articles and news.