2016 IEEE International Conference on Engineering and Technology (ICETECH) 2016
DOI: 10.1109/icetech.2016.7569181
|View full text |Cite
|
Sign up to set email alerts
|

Advanced Persistent Threat defense system using self-destructive mechanism for Cloud Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
4
2

Relationship

2
8

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 13 publications
0
9
0
Order By: Relevance
“…Based on the levels of privileges to access cloud database, the insiders are broadly classified as pure insiders, insider associate, insider affiliate and outside affiliate. A Secure Protocols based on Authentication and Authorization protocols are used for cloud data security [12]. SQL Injection attacker uses different commands to break the verification security credentials and log into the cloud environment, and even links to the SQL Databases, Authentication is the major security credential provided to the cloud and maintained as per the Global Standards, using Azure Active Directory, It protects the credentials of the employees in a company, once the authentication is successful, the employees can access to the specific company applications [13].…”
Section: S Nomentioning
confidence: 99%
“…Based on the levels of privileges to access cloud database, the insiders are broadly classified as pure insiders, insider associate, insider affiliate and outside affiliate. A Secure Protocols based on Authentication and Authorization protocols are used for cloud data security [12]. SQL Injection attacker uses different commands to break the verification security credentials and log into the cloud environment, and even links to the SQL Databases, Authentication is the major security credential provided to the cloud and maintained as per the Global Standards, using Azure Active Directory, It protects the credentials of the employees in a company, once the authentication is successful, the employees can access to the specific company applications [13].…”
Section: S Nomentioning
confidence: 99%
“…As we know that opinion mining is the responsible feature for the online marketing and e-business, we did experiment using the java eclipse programming language, where the posting opinion is done with input date and time which is collected automatically where the input of the product name is taken along with the rating with five options such as Excellent, very-good, good, not bad, poor and also a text box for memo is given for the information of the opinion. After giving opinion on the product the user will click on the option button, that is Add my opinion, where the opinions are stored in databases [14].…”
Section: Experimental Analysismentioning
confidence: 99%
“…One of WEKA's major strengths is that it is easily extended with customized or new classifiers, clusters, attribute selection methods, and other components. Cloud computing provides convenient data and information storage systems, due to targeted cyber-attacks on cloud, Industrialists and Researchers all over the world concentrated on the cloud security, as cloud provides convenient data storage system for industry, government, researchers and academic users with cost-effective access to distributed services through internet, the main challenge is the data privacy and information security [5]. In 2015 Saranya Chandran et.al focused on the real-world problem that is advanced persistent threat and identification of an efficient classification model for detection of APT using different classifiers such as Random Forest, Naïve Bayes and J-48 [6].…”
Section: Related Workmentioning
confidence: 99%