Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique

  • Dwi Kurnia Wibowo Universitas Islam Indonesia
  • Ahmad Luthfi Indonesian Islamic University
  • Yudi Prayudi Indonesian Islamic University
  • Erika Ramadhani Indonesian Islamic University
  • Muhamad Maulana Indonesian Islamic University
Keywords: Cloud, MITC, Forensics, ADAM, Analysis

Abstract

Cloud computing is a service system mechanism that businesses and organizations use to perform computerized and integrated transactions over computer networks. The service system must, of course, bematchedwith acertain amountof security. It is applied toforecast the probability of cybercrime. A Cloud Service Provider (CSP) often offers cloud-based services with a basic level of security. Typically, CSPs are set up to offer their services on the open internet. Data security-focused organizations strive to shield their systems from a wide range of attackers. One of the alternatives is to construct a private cloud computing system. The issue is the potential for Man in the Cloud (MITC) assaults, which compromise and modify identities and are identified in cloud systems as phony insider threats. Based on the ISO 27032 standard research, the goal of this work is to undertake a threat analysis of MITC attack methodologies against private cloud computing services. With regards to risks to cloud services in a private cloud computing environment, it is intended that reporting and documenting the study' findings would lead to suggestions for more research and cybersecurity management procedures.

 

Downloads

Download data is not yet available.

References

N. Widiyasono, I. Riadi, and A. Luthfi, “Investigation on the services of private cloud computing by using ADAM Method,” International Journal of Electrical and Computer Engineering, vol. 6, no. 5, pp. 2387–2395, 2016, doi: 10.11591/ijece.v6i5.11527.

N. Tissir, S. el Kafhali, and N. Aboutabit, “Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposal,” Journal of Reliable Intelligent Environments, vol. 7, no. 2. Springer Science and Business Media Deutschland GmbH, pp. 69–84, Jun. 01, 2021. doi: 10.1007/s40860-020-00115-0.

P. Sharma, D. Arora, and T. Sakthivel, “Enhanced Forensic Process for Improving Mobile Cloud Traceability in Cloud-Based Mobile Applications,” in Procedia Computer Science, 2020, vol. 167, pp. 907–917. doi: 10.1016/j.procs.2020.03.390.

M. I. Tariq and V. Santarcangelo, “Analysis of ISO 27001:2013 controls effectiveneb for cloud computing,” in ICISSP 2016 - Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016, pp. 201–208. doi: 10.5220/0005648702010208.

A. Alshammari, S. Alhaidari, A. Alharbi, and M. Zohdy, “Security Threats and Challenges in Cloud Computing,” in Proceedings - 4th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2017 and 3rd IEEE International Conference of Scalable and Smart Cloud, SSC 2017, Jul. 2017, pp. 46–51. doi: 10.1109/CSCloud.2017.59.

A. Harilal, F. Toffalini, J. Castellanos, J. Guarnizo, I. Homoliak, and M. Ochoa, “TWOS: A dataset of malicious insider threat behavior based on a gamified competition,” in MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017, Oct. 2017, vol. 2017-January, pp. 45–56. doi: 10.1145/3139923.3139929.

D. C. Le and A. N. Zincir-Heywood, “Evaluating insider threat detection workflow using supervised and unsupervised learning,” in Proceedings - 2018 IEEE Symposium on Security and Privacy Workshops, SPW 2018, Aug. 2018, pp. 270–275. doi: 10.1109/SPW.2018.00043.

F. Liu, X. Jiang, Y. Wen, X. Xing, D. Zhang, and D. Meng, “Log2vec: A heterogeneous graph embedding based approach for detecting cyber threats within enterprise,” in Proceedings of the ACM Conference on Computer and Communications Security, Nov. 2019, pp. 1777–1794. doi: 10.1145/3319535.3363224.

P. Moriano, J. Pendleton, S. Rich, and L. J. Camp, “Insider threat event detection in user-system interactions,” in MIST 2017 - Proceedings of the 2017 International Workshop on Managing Insider Security Threats, co-located with CCS 2017, Oct. 2017, vol. 2017-January, pp. 1–12. doi: 10.1145/3139923.3139928.

X. Liang, S. Shetty, L. Zhang, C. Kamhoua, and K. Kwiat, “Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform,” in IEEE International Conference on Cloud Computing, CLOUD, Sep. 2017, vol. 2017-June, pp. 302–309. doi: 10.1109/CLOUD.2017.46.

Triawan Adi Cahyanto, M. A. Rizal, Ari Eko Wardoyo, Taufiq Timur Warisaji, and Daryanto, “Live Forensic to Identify the Digital Evidence on the Desktop-based WhatsApp,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 2, pp. 213–219, Apr. 2022, doi: 10.29207/resti.v6i2.3849.

M. Malatji, A. Marnewick, and S. von Solms, “Validation of a socio-technical management process for optimising cybersecurity practices,” Comput Secur, vol. 95, Aug. 2020, doi: 10.1016/j.cose.2020.101846.

M. Malatji, S. von Solms, and A. Marnewick, “Socio-technical systems cybersecurity framework,” Information and Computer Security, vol. 27, no. 2, pp. 233–272, May 2019, doi: 10.1108/ICS-03-2018-0031.

S. Yuan and X. Wu, “Deep learning for insider threat detection: Review, challenges and opportunities,” Computers and Security, vol. 104. Elsevier Ltd, May 01, 2021. doi: 10.1016/j.cose.2021.102221.

F. Yuan, Y. Cao, Y. Shang, Y. Liu, J. Tan, and B. Fang, “Insider threat detection with deep neural network,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, vol. 10860 LNCS, pp. 43–54. doi: 10.1007/978-3-319-93698-7_4.

S. H. Mohtasebi, A. Dehghantanha, and K. K. R. Choo, “Cloud Storage Forensics: Analysis of Data Remnants on SpiderOak, JustCloud, and pCloud,” in Contemporary Digital Forensic Investigations of Cloud and Mobile Applications, Elsevier Inc., 2017, pp. 205–246. doi: 10.1016/B978-0-12-805303-4.00013-7.

C. Y. Cheng, E. Colbert, and H. Liu, “Experimental study on the detectability of man-in-the-middle attacks for cloud applications,” in Proceedings - 2019 3rd IEEE International Conference on Cloud and Fog Computing Technologies and Applications, Cloud Summit 2019, Aug. 2019, pp. 52–57. doi: 10.1109/CloudSummit47114.2019.00015.

T. Sianturi and Kalamullah Ramli, “A Security Framework for Secure Host-to-Host Environments,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 3, pp. 380–386, Jun. 2022, doi: 10.29207/resti.v6i3.4018.

A. Ghorbel, M. Ghorbel, and M. Jmaiel, “Privacy in cloud computing environments: a survey and research challenges,” Journal of Supercomputing, vol. 73, no. 6, pp. 2763–2800, Jun. 2017, doi: 10.1007/s11227-016-1953-y.

Z. A. Al-Sharif, M. I. Al-Saleh, L. M. Alawneh, Y. I. Jararweh, and B. Gupta, “Live forensics of software attacks on cyber–physical systems,” Future Generation Computer Systems, vol. 108, pp. 1217–1229, Jul. 2020, doi: 10.1016/j.future.2018.07.028.

N. Y. Ahn and D. H. Lee, “Forensics and Anti-Forensics of a NAND Flash Memory: From a Copy-Back Program Perspective,” IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers Inc., pp. 14130–14137, 2021. doi: 10.1109/ACCESS.2021.3052353.

Bita Parga Zen, Anggi Zafia, and Iwan Nofi Yono Putro, “Network Security Analysis Simulation at the GCS in the UCAV to support the Indonesian Defense Area,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 5, pp. 824–831, Nov. 2022, doi: 10.29207/resti.v6i5.4412.

R. R, I. Riadi, and Y. Prayudi, “A Maturity Level Framework for Measurement of Information Security Performance,” Int J Comput Appl, vol. 141, no. 8, pp. 1–6, May 2016, doi: 10.5120/ijca2016907930.

T. Rashid, I. Agrafiotis, and J. R. C. Nurse, “A new take on detecting insider threats: Exploring the use of Hidden Markov Models,” in MIST 2016 - Proceedings of the International Workshop on Managing Insider Security Threats, co-located with CCS 2016, Oct. 2016, pp. 47–56. doi: 10.1145/2995959.2995964.

B. Krumay, E. W. N. Bernroider, and R. Walser, “Evaluation of Cybersecurity Management Controls and Metrics of Critical Infrastructures: A Literature Review Considering the NIST Cybersecurity Framework,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, vol. 11252 LNCS, pp. 369–384. doi: 10.1007/978-3-030-03638-6_23.

S. Alneyadi, E. Sithirasenan, and V. Muthukkumarasamy, “A survey on data leakage prevention systems,” Journal of Network and Computer Applications, vol. 62, pp. 137–152, Feb. 2016, doi: 10.1016/j.jnca.2016.01.008.

R. von Solms and J. van Niekerk, “From information security to cyber security,” Comput Secur, vol. 38, pp. 97–102, 2013, doi: 10.1016/j.cose.2013.04.004.

M. Alim, I. Riadi, and Y. Prayudi, “Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard,” Int J Comput Appl, vol. 180, no. 35, pp. 23–30, Apr. 2018, doi: 10.5120/ijca2018916879.

H. Ernita, Y. Ruldeviyani, D. Nurul Maftuhah, and R. Mulyadi, “Strategy to Improve Employee Security Awareness at Information Technology Directorate Bank XYZ,” Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi), vol. 6, no. 4, pp. 577–584, Aug. 2022, doi: 10.29207/resti.v6i4.4170.

R. Adams, V. Hobbs, and G. Mann, “The Advanced Data Acquisition Model (Adam): A Process Model for Digital Forensic Practice,” Journal of Digital Forensics, Security and Law, 2013, doi: 10.15394/jdfsl.2013.1154

Published
2022-12-29
How to Cite
Dwi Kurnia Wibowo, Ahmad Luthfi, Yudi Prayudi, Erika Ramadhani, & Muhamad Maulana. (2022). Faux Insider Hazard Investigation on Non-Public Cloud Computing by Using ADAM’s Technique. Jurnal RESTI (Rekayasa Sistem Dan Teknologi Informasi), 6(6), 1028 - 1036. https://doi.org/10.29207/resti.v6i6.4714
Section
Artikel Teknologi Informasi