Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment

被引:1
|
作者
Park, Ji Su [1 ]
机构
[1] Jeonju Univ, Dept Comp Sci & Engn, Jeonju, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2024年 / 25卷 / 04期
基金
新加坡国家研究基金会;
关键词
SIEM; Security intelligence; Security log; Correlation analysis; Cloud;
D O I
10.70003/160792642024072504013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, as cloud environments have spread, security technologies have strengthened preemptive defense technologies that predict and prevent various attacks. For example, security intelligence solutions, which have experienced considerable challenges, do not have sufficient reference data to operate, but many companies are introducing reference operational solutions. Among them, the analysis of the correlation between the log and parsing log heterogeneity requires considerable time and manpower. In this study, we create a rule for the security scenario based on parsing techniques to extract and parse the log of the log using only meaningful data and propose a method for purifying that can detect an intelligent security threat.
引用
收藏
页码:629 / 635
页数:7
相关论文
共 50 条
  • [31] Assessment of Different Security Issues, Threats with Their Detection and Prevention Security Models in Mobile Cloud Computing (MCC)
    Vishal
    Kaur, Bikrampal
    Jangra, Surender
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 322 - 333
  • [32] Intelligent Security on the Edge of the Cloud
    Zissis, Dimitrios
    2017 INTERNATIONAL CONFERENCE ON ENGINEERING, TECHNOLOGY AND INNOVATION (ICE/ITMC), 2017, : 1066 - 1070
  • [33] Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment
    Shyla, S. Immaculate
    Sujatha, S. S.
    JOURNAL OF INTELLIGENT SYSTEMS, 2020, 29 (01) : 1626 - 1642
  • [34] Cloud Security Engineering: Avoiding Security Threats the Right Way
    Aljawarneh, Shadi
    INTERNATIONAL JOURNAL OF CLOUD APPLICATIONS AND COMPUTING, 2011, 1 (02) : 64 - 70
  • [35] Data security threats in the home of environment
    Proctor, T
    Home-Oriented Informatics and Telematics, Proceedings, 2005, 178 : 133 - 144
  • [36] Mitigating Threats and Security Metrics in Cloud Computing
    Kar, Jayaprakash
    Mishra, Manoj Ranjan
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2016, 12 (02): : 226 - 233
  • [37] A Classification and Characterization of Security Threats in Cloud Computing
    Islam, Tariqul
    Manivannan, D.
    Zeadally, Sherali
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2016, 7 (01): : 1 - 17
  • [38] An Intelligent Surveillance Video Analysis Service in Cloud Environment
    Chen, Tse-Shih
    Lin, Ming-Fen
    Chieuh, Tzi-cker
    Chang, Cheng-Hsin
    Tai, Wei-Heng
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 1 - 6
  • [39] A Critical Review of Security Threats in Cloud Computing
    Irfan, Mahroosh
    Usman, Muhammad
    Zhuang, Yan
    Fong, Simon
    2015 3RD INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL AND BUSINESS INTELLIGENCE (ISCBI 2015), 2015, : 105 - 111
  • [40] A survey on top security threats in cloud computing
    Kazim, Muhammad
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2015, 6 (03) : 109 - 113