Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing

Mohanaad Shakir, Asmidar Abu Bakar, Younus Yousoff, Mostafa Al-Emran, Maytham Hammood

Research output: Contribution to journalArticle

1 Citation (Scopus)

Abstract

Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker “who don’t have a password” is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of “Confidence Range “. The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm.

Original languageEnglish
Pages (from-to)416-427
Number of pages12
JournalJournal of Theoretical and Applied Information Technology
Volume94
Issue number2
Publication statusPublished - 31 Dec 2016

Fingerprint

Password
User Behavior
Cloud computing
Cloud Computing
Confidence
Range of data
Authentication
Monitoring
Costs
Attack
Electronics
Synthesis

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Shakir, Mohanaad ; Abu Bakar, Asmidar ; Yousoff, Younus ; Al-Emran, Mostafa ; Hammood, Maytham. / Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing. In: Journal of Theoretical and Applied Information Technology. 2016 ; Vol. 94, No. 2. pp. 416-427.
@article{b6c9dcfb7bf14b188aed2103e99bea26,
title = "Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing",
abstract = "Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker “who don’t have a password” is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of “Confidence Range “. The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm.",
author = "Mohanaad Shakir and {Abu Bakar}, Asmidar and Younus Yousoff and Mostafa Al-Emran and Maytham Hammood",
year = "2016",
month = "12",
day = "31",
language = "English",
volume = "94",
pages = "416--427",
journal = "Journal of Theoretical and Applied Information Technology",
issn = "1992-8645",
publisher = "Asian Research Publishing Network (ARPN)",
number = "2",

}

Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing. / Shakir, Mohanaad; Abu Bakar, Asmidar; Yousoff, Younus; Al-Emran, Mostafa; Hammood, Maytham.

In: Journal of Theoretical and Applied Information Technology, Vol. 94, No. 2, 31.12.2016, p. 416-427.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing

AU - Shakir, Mohanaad

AU - Abu Bakar, Asmidar

AU - Yousoff, Younus

AU - Al-Emran, Mostafa

AU - Hammood, Maytham

PY - 2016/12/31

Y1 - 2016/12/31

N2 - Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker “who don’t have a password” is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of “Confidence Range “. The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm.

AB - Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker “who don’t have a password” is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of “Confidence Range “. The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm.

UR - http://www.scopus.com/inward/record.url?scp=85008172839&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85008172839&partnerID=8YFLogxK

M3 - Article

VL - 94

SP - 416

EP - 427

JO - Journal of Theoretical and Applied Information Technology

JF - Journal of Theoretical and Applied Information Technology

SN - 1992-8645

IS - 2

ER -