User authentication in the online environment is promoting a hugely challenging issue. This has contributed to the realization of a user authentication where the exams can be performed over the Internet at any time and from any place and by using any digital device. Consequently, further investigations are required to focus on improving user authentication methods to enhance online security mechanisms, especially in the field of e-exams. This research proposes a new user authentication technique based on the user interface (UI). The novel idea is created based on the design preferences of candidates who are taking the e-exams. Several design features are used to design a special user interface for e-exams, for example, the font attributes, back colour, number of questions per page, group categories for questions based on difficulties, and timer setting. The introduced technique can be used to support the user authentication process in the e-exams environment. Furthermore, the proposed technique provides the ability to login to the e-exam without the need to remember the login information, but to select what the student prefers according to his/her personal information. Based on the literature review, a primary evaluation claiming that the students have differences in their preferences and that each user has stable design preferences within different sessions is revealed. In regard to these facts, they become the resource and essence of this research. The security performance of the proposed method is evaluated. The results of the experiments show a false positive (FP) rate of 0.416% and a false negative (FN) rate of 0%.
Cloud computing technology is a concept of providing dramatically scalable and virtualized resources, bandwidth, software and hardware on demand to users. Users can request cloud services via a web browser or web service. Cloud computing consists of valuable resources, such as, networks, servers, applications, storage and services with a shared network. By using cloud computing, users can save cost of hardware deployment, software licenses and system maintenance. Many security risks such as worm can interrupt cloud computing services; damage the spiteful service, application or virtual in the cloud structure. Nowadays the worm attacks are becoming more sophisticated and intelligent, makes it is harder to be detected than before. Based on the implications posed by this worm, this is the urge where this research comes in. This paper aims to build a new model to detect worm attacks in cloud computing environment based on worm signature extraction and features behavioral using dynamic analysis. Furthermore this paper presents a proof of concept on how the worm works and discusses the future challenges and the ongoing research to detect worm attacks in cloud computing efficiently.
Cloud computing technology is known as a distributed computing network, which consists of a large number of servers connected via the internet. This technology involves many worthwhile resources, such as applications, services, and large database storage. Users have the ability to access cloud services and resources through web services. Cloud computing provides a considerable number of benefits, such as effective virtualized resources, cost efficiency, self-service access, flexibility, and scalability. However, many security issues are present in cloud computing environment. One of the most common security challenges in the cloud computing environment is the trojan horses. Trojan horses can disrupt cloud computing services and damage the resources, applications, or virtual machines in the cloud structure. Trojan horse attacks are dangerous, complicated and very difficult to be detected. In this research, eight machine learning classifiers for trojan horse detection in a cloud-based environment have been investigated. The accuracy of the cloud trojan horses detection rate has been investigated using dynamic analysis, Cukoo sandbox, and the Weka data mining tool. Based on the conducted experiments, the SMO and Multilayer Perceptron have been found to be the best classifiers for trojan horse detection in a cloud-based environment. Although SMO and Multilayer Perceptron have achieved the highest accuracy rate of 95.86%, Multilayer Perceptron has outperformed SMO in term of Receiver Operating Characteristic (ROC) area.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.