Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
ABSTRACT
Advanced persistence threat (APT) attack is to steal which may be positive, negative or neutral. It is also
data rather than to cause damage to the network or known as data mining, deriving the view or attitude of
organization. It is one of the initial phases in a speaker. Sentimental analysis is mainly based on
successful hacking of a system. Here, user’s machine learning where the system classify the
behaviour is analysed based on previous behaviour emotions and opinions of the humans based on the
such as posted data, time of posting, IP address and content, which may be a text or voice. The
location of usage of social network. This system sentimental analysis predicts the emotions based on
includes two processes. The Social network accounts the understanding of the opinions and content of the
are analysed, tracked and then detected. If the hacker social data given by the user. Sentimental analysis is
attacks the original user’s account, then the system enormously used because it gives an abstracted view
allows the attacker to proceed further until our system about the public opinions about certain topics or
captures all the important information about the emotions. Social media monitoring tools make that
attacker by directing the hacker to the fake website. process faster and easier than ever before. The ability
The system generates Honeywords based on the user or skill to get an understanding about the detailed
information provided and the original password is view of data used in social networks is widely used in
converted into another format and stored along with lot of enterprises. The changes that have been shown
the honeywords. Attacker who knows the E-mail in social media have been similar to that of the
account of original user can easily reset the password changes that have been shown in stock markets. The
of the cloud server. When the attacker tries to login human language is complex. It’s tedious to teach a
into the purchase portal, he/she is tracked and allowed machine to analyse the various grammatical shades,
to do purchase. Server identifies the attacker and cultural variations, slang and misspellings that occur
sends an alert message to the owner and blocks the in online mentions.
attacker from doing transaction from his original
account. Honeyword
Keywords: Cloud security; Hacker; Honeywords; Honeywords are sequence of characters that are
Sentimental Analysis; Social Networks generated by humans that look like a password.
Honeywords are proposed as part of honeypot, so that
Introduction any intruder attempting to log in with the password
may be assumed to be an attacker. Hackers these days
Sentimental Analysis: create automata that produce sequence of possible
passwords. Some hackers perform a weighted random
Sentimental analysis is the process mainly used to
walk against a PCFG grammar that was trained on
predict the emotions based on the content of the text,
Controllability of
social networks Marco Cremonini
Computational Social Networks metrics and
7. and the strategic use and Francesca
Networks (2017)Springer Diffusion metrics.
of random Casamassima
information
Design and
Implementation of Management information
Guoyong Zhao and Springer-Verlag Berlin
8. the Online system, Model View
Zhiyu Zhou Heidelberg (2012)
Shopping Controller pattern
System
XinRuan, Zhenyu
Wu, Member, IEEE,
Profiling Online IEEE Transactions on
Haining Wang, Honeypot
Social Behaviors for Information Forensics and
9. Senior Member, accounts,Extroversive and
Compromised Security (Volume:
IEEE, and IntroversiveBehavior
Account Detection 11, Issue: 1, Jan. 2016)
SushilJajodia,
Fellow, IEEE