Indian Journal of Science and Technology
Year: 2015, Volume: 8, Issue: 28, Pages: 1-9
J. Vijaya Chandra1 , Narasimham Challa2 and Sai Kiran Pasupuleti 3
1 Department of CSE, KL University, Guntur - 522002, Andra Pradesh, India
2 Department of CSE, Sri Sivani College of Engineering, Chilakapalem, Andra Pradesh, India
3 Department of CSE, KL University, Guntur - 522002, Andra Pradesh, India;
[email protected], [email protected], [email protected]
Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social cloud against risks, threats and attacks. In this paper we discussed the policies and procedures of vulnerability management and intrusion detection system. We also focused on the steps involved in defense in depth system a layered architecture for prevention and protection from malicious users, masquerader and intruders. Where each layer restricts the intruder with deployed activities such as security monitoring, malicious site filtering, patches to remedy vulnerabilities, analysis of audit log files, Intrusion detection and prevention system and storage media management for protecting the cloud from advanced persistent threat. The different intrusion techniques using social engineering methods such as spear phishing or whale phishing are also discussed. A mathematical approach is given to secure the cloud computing using computational intelligence which is aimed to defense the attacks using Perron-Frobenius theorem and methods for public social network. In this paper we focused on the Defense in Depth model for a security layered strategy. We also discussed on the issues an audit communication or challenge to the cloud server data security. Defense System is the process of monitoring for and identifying unauthorized system access or manipulation and protecting the data from intruders. A clear description is given regarding the steps involved in the Advanced Persistent Attack and the measures or steps involved in Advanced Persistent Attack Defense System. The impact of security and privacy on cloud performance is calculated using cloud-sim tool, which supports simulating and modeling a large scale cloud infrastructure. An Experiment on intelligence based defense system using cloud analyst and simulator is given along with the result and conclusion.
Keywords: Advanced Persistent Attack, Cloud Computing, Cloud Security, Cloud Server, Defense in Depth, Defense System, Vulnerability
Subscribe now for latest articles and news.