Visible to the public Insider Attack Detection and Prevention using Server Authentication using Elgamal Encryption

TitleInsider Attack Detection and Prevention using Server Authentication using Elgamal Encryption
Publication TypeConference Paper
Year of Publication2022
AuthorsAkshara Vemuri, Sai, Krishna Chaitanya, Gogineni
Conference Name2022 International Conference on Inventive Computation Technologies (ICICT)
Keywordsauthentication, Costs, cryptography, ElGamal encryption, Elliptic curve cryptography, Human Behavior, human factors, insider attacks, insider threat, insider threats, legitimate node, location awareness, Metrics, passwords, Policy Based Governance, policy-based governance, Protocols, pubcrawl, resilience, Resiliency, secure authentication, Two way authentication, web services
AbstractWeb services are growing demand with fundamental advancements and have given more space to researchers for improving security of all real world applications. Accessing and get authenticated in many applications on web services, user discloses their password and other privacy data to the server for authentication purposes. These shared information should be maintained by the server with high security, otherwise it can be used for illegal purposes for any authentication breach. Protecting the applications from various attacks is more important. Comparing the security threats, insider attacks are most challenging to identify due to the fact that they use the authentication of legitimate users and their privileges to access the application and may cause serious threat to the application. Insider attacks has been studied in previous researchers with different security measures, however there is no much strong work proposed. Various security protocols were proposed for defending insider attackers. The proposed work focused on insider attack protection through Elgamal cryptography technique. The proposed work is much effective on insider attacks and also defends against various attacks. The proposed protocol is better than existing works. The key computation cost and communication cost is relatively low in this proposed work. The proposed work authenticates the application by parallel process of two way authentication mechanism through Elgamal algorithm.
DOI10.1109/ICICT54344.2022.9850623
Citation Keyakshara_vemuri_insider_2022