Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment

被引:1
|
作者
Park, Ji Su [1 ]
机构
[1] Jeonju Univ, Dept Comp Sci & Engn, Jeonju, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2024年 / 25卷 / 04期
基金
新加坡国家研究基金会;
关键词
SIEM; Security intelligence; Security log; Correlation analysis; Cloud;
D O I
10.70003/160792642024072504013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, as cloud environments have spread, security technologies have strengthened preemptive defense technologies that predict and prevent various attacks. For example, security intelligence solutions, which have experienced considerable challenges, do not have sufficient reference data to operate, but many companies are introducing reference operational solutions. Among them, the analysis of the correlation between the log and parsing log heterogeneity requires considerable time and manpower. In this study, we create a rule for the security scenario based on parsing techniques to extract and parse the log of the log using only meaningful data and propose a method for purifying that can detect an intelligent security threat.
引用
收藏
页码:629 / 635
页数:7
相关论文
共 50 条
  • [1] Comparative Analysis of Security Threats in Mobile Cloud Computing Environment
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    2018 7TH INTERNATIONAL CONFERENCE ON RELIABILITY, INFOCOM TECHNOLOGIES AND OPTIMIZATION (TRENDS AND FUTURE DIRECTIONS) (ICRITO) (ICRITO), 2018, : 385 - 390
  • [2] Security Threats/Attacks Present in Cloud Environment
    Munir, Kashif
    Palaniappan, Sellapan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 107 - 114
  • [3] A new approach to mitigate security threats in cloud environment
    Saadi, Chaimae
    Chaoui, Habiba
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [4] Model of hidden IT security threats in the cloud computing environment
    Molyakov A.S.
    Zaborovsky V.S.
    Lukashin A.A.
    Automatic Control and Computer Sciences, 2015, 49 (8) : 741 - 744
  • [5] Security Analysis in Cloud Environment
    Akshay, M. S.
    Kakkar, Ashina
    Jayasree, K.
    Prudhvi, P.
    Metgal, Prathibha Shridhara
    ARTIFICIAL INTELLIGENCE AND EVOLUTIONARY ALGORITHMS IN ENGINEERING SYSTEMS, VOL 1, 2015, 324 : 221 - 228
  • [6] Assessment on potential security threats and introducing novel data security model in cloud environment
    Ahmad, Shahnawaz
    Mehfuz, Shabana
    Beg, Javed
    MATERIALS TODAY-PROCEEDINGS, 2022, 62 : 4909 - 4915
  • [7] A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services
    Lee, Changsoo
    Jung, Daewon
    Lee, Keunwang
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 21 - 29
  • [8] An analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman
    AlZadjali, Amira M.
    Al-Badi, Ali H.
    Ali, Saqib
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 423 - 428
  • [9] SECURITY THREATS AND ATTACKS IN CLOUD
    Mohammed, Asma
    Al Khathami, Jamilah
    Alhakami, Wajdi
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (01): : 184 - 191
  • [10] SECURITY THREATS IN CLOUD COMPUTING
    Kajal, Neha
    Ikram, Nikhat
    Prachi
    2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 691 - 694