Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing

Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When u...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohanaad, Shakir, Asmidar, Abu Bakar, Younus, Yousoff, Mostafa, Al-Emran, Maytham, Hammood
Format: Article
Language:English
English
Published: JATIT 2016
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/16640/1/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/16640/6/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/16640/
http://www.jatit.org/volumes/Vol94No2/17Vol94No2.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaysia Pahang
Language: English
English
id my.ump.umpir.16640
record_format eprints
spelling my.ump.umpir.166402017-07-19T03:05:04Z http://umpir.ump.edu.my/id/eprint/16640/ Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing Mohanaad, Shakir Asmidar, Abu Bakar Younus, Yousoff Mostafa, Al-Emran Maytham, Hammood QA76 Computer software Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker "who don't have a password" is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of "Confidence Range ". The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm. JATIT 2016 Article PeerReviewed application/pdf en http://umpir.ump.edu.my/id/eprint/16640/1/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf application/pdf en http://umpir.ump.edu.my/id/eprint/16640/6/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf Mohanaad, Shakir and Asmidar, Abu Bakar and Younus, Yousoff and Mostafa, Al-Emran and Maytham, Hammood (2016) Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing. Journal of Theoretical and Applied Information Technology, 94 (2). pp. 415-427. ISSN 1992-8645 (print); 817-3195 (online) http://www.jatit.org/volumes/Vol94No2/17Vol94No2.pdf
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
English
topic QA76 Computer software
spellingShingle QA76 Computer software
Mohanaad, Shakir
Asmidar, Abu Bakar
Younus, Yousoff
Mostafa, Al-Emran
Maytham, Hammood
Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
description Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker "who don't have a password" is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of "Confidence Range ". The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,” Electronic Personal Synthesis Behavior”, has been generated to the authorized user by the application of confidence range algorithm.
format Article
author Mohanaad, Shakir
Asmidar, Abu Bakar
Younus, Yousoff
Mostafa, Al-Emran
Maytham, Hammood
author_facet Mohanaad, Shakir
Asmidar, Abu Bakar
Younus, Yousoff
Mostafa, Al-Emran
Maytham, Hammood
author_sort Mohanaad, Shakir
title Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
title_short Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
title_full Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
title_fullStr Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
title_full_unstemmed Application Of Confidence Range Algorithm In Recognizing User Behavior Through EPSB in Cloud Computing
title_sort application of confidence range algorithm in recognizing user behavior through epsb in cloud computing
publisher JATIT
publishDate 2016
url http://umpir.ump.edu.my/id/eprint/16640/1/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/16640/6/Application%20Of%20Confidence%20Range%20Algorithm%20In%20Recognizing%20User%20Behavior%20Through%20EPSB%20in%20Cloud%20Computing.pdf
http://umpir.ump.edu.my/id/eprint/16640/
http://www.jatit.org/volumes/Vol94No2/17Vol94No2.pdf
_version_ 1643667980967477248