Details

Cloud File Sharing and Data Security Threats – Exploring the Employability of Graph-Based Unsupervised Learning in Detecting and Safeguarding Cloud Files

Harshit Yadav

Student, Bal Bharati Public School, Dwarka, New Delhi

39-44

Vol: 8, Issue: 4, 2018

Receiving Date: 2018-08-18 Acceptance Date:

2018-10-05

Publication Date:

2018-10-21

Download PDF

Abstract

As increasingly more enterprises are deploying cloud file-sharing services, this adds a new channel for potential insider threats to company data and IPs. In this paper, we introduce a two-stage machine learning system to detect anomalies. In the prelim stage, we anticipate the entrance logs of cloud record sharing administrations onto relationship diagrams and use three complementary graph-based unsupervised learning methods: OddBall, PageRank and Local Outlier Factor (LOF) to generate outlier indicators. In the second stage, we outfit the exception pointers and present the discrete wavelet change (DWT) strategy, and propose a method to utilize wavelet coefficients with the Haar wavelet capacity to distinguish anomalies for insider danger. The proposed system has been deployed in a real business environment, and demonstrated effectiveness by selected case studies.

Keywords: discrete wavelet transform; Haar wavelet; insider threat detection; cloud file-sharing; graph-based unsupervised learning

References

Back

Disclaimer: All papers published in IJRST will be indexed on Google Search Engine as per their policy.

We are one of the best in the field of watches and we take care of the needs of our customers and produce replica watches of very good quality as per their demands.