Mitigation of Insider Attacks for Data Security in Distributed Computing Environments

Mitigation of Insider Attacks for Data Security in Distributed Computing Environments
Author :
Publisher :
Total Pages : 157
Release :
ISBN-13 : OCLC:1102389921
ISBN-10 :
Rating : 4/5 ( Downloads)

Book Synopsis Mitigation of Insider Attacks for Data Security in Distributed Computing Environments by : Santosh Aditham

Download or read book Mitigation of Insider Attacks for Data Security in Distributed Computing Environments written by Santosh Aditham and published by . This book was released on 2017 with total page 157 pages. Available in PDF, EPUB and Kindle. Book excerpt: In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such systems. From the customers perspective, one of the big risks in adopting big data systems is in trusting the service provider who designs and owns the infrastructure, with data security and privacy. However, big data frameworks typically focus on performance and the opportunity for including enhanced security measures is limited. In this dissertation, the problem of mitigating insider attacks is extensively investigated and several static and dynamic run-time techniques are developed. The proposed techniques are targeted at big data systems but applicable to any data system in general. First, a framework is developed to host the proposed security techniques and integrate with the underlying distributed computing environment. We endorse the idea of deploying this framework on special purpose hardware and a basic model of the software architecture for such security coprocessors is presented. Then, a set of compile-time and run-time techniques are proposed to protect user data from the perpetrators. These techniques target detection of insider attacks that exploit data and infrastructure. The compile-time intrusion detection techniques analyze the control flow by disassembling program binaries while the run-time techniques analyze the memory access patterns of processes running on the system. The proposed techniques have been implemented as prototypes and extensively tested using big data applications. Experiments were conducted on big data frameworks such as Hadoop and Spark using cloud-based services. Experimental results indicate that the proposed techniques successfully detect insider attacks in the context of data loss, data degradation, data exposure and infrastructure degradation.


Mitigation of Insider Attacks for Data Security in Distributed Computing Environments Related Books

Mitigation of Insider Attacks for Data Security in Distributed Computing Environments
Language: en
Pages: 157
Authors: Santosh Aditham
Categories: Big data
Type: BOOK - Published: 2017 - Publisher:

DOWNLOAD EBOOK

In big data systems, the infrastructure is such that large amounts of data are hosted away from the users. Information security is a major challenge in such sys
Insider Threats in Cyber Security
Language: en
Pages: 248
Authors: Christian W. Probst
Categories: Computers
Type: BOOK - Published: 2010-07-28 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Insider Threats in Cyber Security is a cutting edge text presenting IT and non-IT facets of insider threats together. This volume brings together a critical mas
Detection and Mitigation of Insider Attacks in a Cloud Infrastructure: Emerging Research and Opportunities
Language: en
Pages: 113
Authors: Gunasekhar, T.
Categories: Computers
Type: BOOK - Published: 2019-02-15 - Publisher: IGI Global

DOWNLOAD EBOOK

Businesses constantly face online hacking threats or security breaches in their online mainframe that expose sensitive information to the wrong audience. Compan
Data Protection from Insider Threats
Language: en
Pages: 77
Authors: Elisa Bertino
Categories: Computers
Type: BOOK - Published: 2022-05-31 - Publisher: Springer Nature

DOWNLOAD EBOOK

As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organization
Insider Threat
Language: en
Pages: 254
Authors: Michael G. Gelles
Categories: Business & Economics
Type: BOOK - Published: 2016-05-28 - Publisher: Butterworth-Heinemann

DOWNLOAD EBOOK

Insider Threat: Detection, Mitigation, Deterrence and Prevention presents a set of solutions to address the increase in cases of insider threat. This includes e