Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment

被引:1
|
作者
Park, Ji Su [1 ]
机构
[1] Jeonju Univ, Dept Comp Sci & Engn, Jeonju, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2024年 / 25卷 / 04期
基金
新加坡国家研究基金会;
关键词
SIEM; Security intelligence; Security log; Correlation analysis; Cloud;
D O I
10.70003/160792642024072504013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, as cloud environments have spread, security technologies have strengthened preemptive defense technologies that predict and prevent various attacks. For example, security intelligence solutions, which have experienced considerable challenges, do not have sufficient reference data to operate, but many companies are introducing reference operational solutions. Among them, the analysis of the correlation between the log and parsing log heterogeneity requires considerable time and manpower. In this study, we create a rule for the security scenario based on parsing techniques to extract and parse the log of the log using only meaningful data and propose a method for purifying that can detect an intelligent security threat.
引用
收藏
页码:629 / 635
页数:7
相关论文
共 50 条
  • [21] Security Threats in Cloud Computing Environments
    Lee, Kangchan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (04): : 25 - 32
  • [22] A security event description of intelligent applications in edge-cloud environment
    Li, Qianmu
    Yin, Xiaochun
    Meng, Shunmei
    Liu, Yaozong
    Ying, Zijian
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2020, 9 (01):
  • [23] A security event description of intelligent applications in edge-cloud environment
    Qianmu Li
    Xiaochun Yin
    Shunmei Meng
    Yaozong Liu
    Zijian Ying
    Journal of Cloud Computing, 9
  • [24] Efficient Approaches for Intrusion Detection in Cloud Environment
    Mishra, Preeti
    Pilli, Emmanuel S.
    Varadharajan, Vijay
    Tupakula, Udaya
    2016 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2016, : 1211 - 1216
  • [25] Analysis of Security and Privacy in Public Cloud Environment
    Raja, Abdul Sattar
    Abd Razak, Shukor
    2015 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (ICCC), 2015, : 53 - 58
  • [26] Network security analysis for cloud computing environment
    Xie, Linjiang
    Hang, Feilu
    Guo, Wei
    Zhang, Zhenhong
    Li, Hanruo
    INTERNATIONAL JOURNAL OF MODELING SIMULATION AND SCIENTIFIC COMPUTING, 2022, 13 (06)
  • [27] Performance analysis of trusted security environment in cloud
    Sharma, Satyajeet
    Sharma, Bhavna
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 657 - 666
  • [28] Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment
    Samy, Ganthan Narayana
    Albakri, Sameer Hasan
    Maarop, Nurazean
    Magalingam, Pritheega
    Wong, Doris Hooi-Ten
    Shanmugam, Bharanidharan
    Perumal, Sundresan
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 566 - 578
  • [29] Threats and Security Issues in Cloud Storage and Content Delivery Networks: Analysis
    Waguia, Jean Daniel Kouam
    Menshchikov, Alexander
    PROCEEDINGS OF THE 28TH CONFERENCE OF OPEN INNOVATIONS ASSOCIATION FRUCT, 2021, : 194 - 199
  • [30] Efficient Management of Security and Privacy Issues in Mobile Cloud Environment
    Jana, Debasish
    Bandyopadhyay, Debasis
    2013 ANNUAL IEEE INDIA CONFERENCE (INDICON), 2013,