Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing

Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When u...

Full description

Saved in:
Bibliographic Details
Main Authors: Shakir M., Abubakar A.B., Yousoff Y., Al-Emran M., Hammood M.
Other Authors: 57057236900
Format: Article
Published: Asian Research Publishing Network 2023
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.uniten.dspace-22594
record_format dspace
spelling my.uniten.dspace-225942023-05-29T14:11:15Z Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing Shakir M. Abubakar A.B. Yousoff Y. Al-Emran M. Hammood M. 57057236900 35178991300 57190977401 56593108000 55014228000 Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker �who don�t have a password� is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of �Confidence Range �. The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,� Electronic Personal Synthesis Behavior�, has been generated to the authorized user by the application of confidence range algorithm. � 2005 - 2016 JATIT & LLS. All rights reserved. Final 2023-05-29T06:11:15Z 2023-05-29T06:11:15Z 2016 Article 2-s2.0-85008172839 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85008172839&partnerID=40&md5=eb8b11dbc73b60243f00cfd76cd67244 https://irepository.uniten.edu.my/handle/123456789/22594 94 2 416 427 Asian Research Publishing Network Scopus
institution Universiti Tenaga Nasional
building UNITEN Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Tenaga Nasional
content_source UNITEN Institutional Repository
url_provider http://dspace.uniten.edu.my/
description Within the security scope, Authentication is considered as a core model to control accessing any system. Password is one of the most significant mechanisms which diagnose the authorized user from others. However, it is facing many problems such as spoofing and man in the middle attack(MitMA). When unauthorized user has got the correct password. Then, this user would be able to access into the data and change previous password which causes significant loss in efforts and cost. Similarly, the hacker �who don�t have a password� is also trying to penetrate the system through predicted a set of words. In fact, both of authorized and hacker users work to input a wrong password, but authorized user may have only one or two wrong characters while the hacker inputs a whole wrong password. The aim of this paper, established an algorithm under the name of �Confidence Range �. The main tasks of this algorithm are monitoring all the activities which associated with the password on time, error, and style to the authorized user to recognize any suspicious activity. For that reason, a unique EPSB,� Electronic Personal Synthesis Behavior�, has been generated to the authorized user by the application of confidence range algorithm. � 2005 - 2016 JATIT & LLS. All rights reserved.
author2 57057236900
author_facet 57057236900
Shakir M.
Abubakar A.B.
Yousoff Y.
Al-Emran M.
Hammood M.
format Article
author Shakir M.
Abubakar A.B.
Yousoff Y.
Al-Emran M.
Hammood M.
spellingShingle Shakir M.
Abubakar A.B.
Yousoff Y.
Al-Emran M.
Hammood M.
Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
author_sort Shakir M.
title Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
title_short Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
title_full Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
title_fullStr Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
title_full_unstemmed Application of confidence range algorithm in recognizing user behavior through EPSB in cloud computing
title_sort application of confidence range algorithm in recognizing user behavior through epsb in cloud computing
publisher Asian Research Publishing Network
publishDate 2023
_version_ 1806426136185405440
score 13.18916