Advanced Persistent Threat is a specific design to survive until it reaches the target and create... more Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social cloud against risks, threats and attacks. In this paper we discussed the policies and procedures of vulnerability management and intrusion detection system. We also focused on the steps involved in defense in depth system a layered architecture for prevention and protection from malicious users, masquerader and intruders. Where each layer restricts the intruder with deployed activities such as security monitoring, malicious site filtering, patches to remedy vulnerabilities, analysis of audit log files, Intrusion detection and prevention system and storage media management for protecting the cloud from advanced persistent threat. The different intrusion techniques using social engineering methods such as spear phishing or whale phishing are also discussed. A mathematical approach is given to secure the cloud computing using computational intelligence which is aimed to defense the attacks using Perron-Frobenius theorem and methods for public social network. In this paper we focused on the Defense in Depth model for a security layered strategy. We also discussed on the issues an audit communication or challenge to the cloud server data security. Defense System is the process of monitoring for and identifying unauthorized system access or manipulation and protecting the data from intruders. A clear description is given regarding the steps involved in the Advanced Persistent Attack and the measures or steps involved in Advanced Persistent Attack Defense System. The impact of security and privacy on cloud performance is calculated using cloud-sim tool, which supports simulating and modeling a large scale cloud infrastructure. An Experiment on intelligence based defense system using cloud analyst and simulator is given along with the result and conclusion.
Social Network is a network where a set of individuals, groups or organizations interact and co... more Social Network is a network where a set of individuals, groups or organizations interact and communicate, explore the social relationships and diagrammatically represented as a Graph. Social Networking Service is the service where people can share data resources and communicate in bidirectional with web multimedia. In this paper we discussed metrics in social networking such as clustering coefficient, cohesion, reach and rediality. Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and attacks.
Advanced Persistent Threat is a specific design to survive until it reaches the target and create... more Advanced Persistent Threat is a specific design to survive until it reaches the target and creates backdoor for future Intrusion. The objective of this paper is, to design and implementation of a defense in depth system to protect social cloud against risks, threats and attacks. In this paper we discussed the policies and procedures of vulnerability management and intrusion detection system. We also focused on the steps involved in defense in depth system a layered architecture for prevention and protection from malicious users, masquerader and intruders. Where each layer restricts the intruder with deployed activities such as security monitoring, malicious site filtering, patches to remedy vulnerabilities, analysis of audit log files, Intrusion detection and prevention system and storage media management for protecting the cloud from advanced persistent threat. The different intrusion techniques using social engineering methods such as spear phishing or whale phishing are also discussed. A mathematical approach is given to secure the cloud computing using computational intelligence which is aimed to defense the attacks using Perron-Frobenius theorem and methods for public social network. In this paper we focused on the Defense in Depth model for a security layered strategy. We also discussed on the issues an audit communication or challenge to the cloud server data security. Defense System is the process of monitoring for and identifying unauthorized system access or manipulation and protecting the data from intruders. A clear description is given regarding the steps involved in the Advanced Persistent Attack and the measures or steps involved in Advanced Persistent Attack Defense System. The impact of security and privacy on cloud performance is calculated using cloud-sim tool, which supports simulating and modeling a large scale cloud infrastructure. An Experiment on intelligence based defense system using cloud analyst and simulator is given along with the result and conclusion.
Social Network is a network where a set of individuals, groups or organizations interact and co... more Social Network is a network where a set of individuals, groups or organizations interact and communicate, explore the social relationships and diagrammatically represented as a Graph. Social Networking Service is the service where people can share data resources and communicate in bidirectional with web multimedia. In this paper we discussed metrics in social networking such as clustering coefficient, cohesion, reach and rediality. Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and attacks.
Uploads
Papers by Pasupuleti Kiran
social networking such as clustering coefficient, cohesion, reach and rediality.
Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and
simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and
defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the
components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and
attacks.
social networking such as clustering coefficient, cohesion, reach and rediality.
Social network graph theory is related to link analysis, structural analysis and centrality measures; we also concentrated on Numerical formulations and
simulations using datasets which are used for analysis of social network.Risks, Threats and vulnerabilities on social network areinterrelated to social engineering and part of Advanced Persistent Threat. Security approaches and
defense methods are discussed, developed and roved.Mathematical and Statistical theorems are developed with respect to the Algorithmic approach for social networks security in social cloud platform. Social Patterns are the
components and pieces of interactivity that are the building blocks of social experiences. We focused on the electronic connections and social tools that are changing the way that we interact with one another, which are designed and simplified to expand online experiences in social networks. We did considerations as practical approach where we applied statistical tools on network data and data analysis is given. Security is the principle concern; the main objective is to protect the social cloud from advanced risks, threats and
attacks.