Efficient Analysis and Detection of Intelligent Security Threats in Cloud Environment

被引:1
|
作者
Park, Ji Su [1 ]
机构
[1] Jeonju Univ, Dept Comp Sci & Engn, Jeonju, South Korea
来源
JOURNAL OF INTERNET TECHNOLOGY | 2024年 / 25卷 / 04期
基金
新加坡国家研究基金会;
关键词
SIEM; Security intelligence; Security log; Correlation analysis; Cloud;
D O I
10.70003/160792642024072504013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, as cloud environments have spread, security technologies have strengthened preemptive defense technologies that predict and prevent various attacks. For example, security intelligence solutions, which have experienced considerable challenges, do not have sufficient reference data to operate, but many companies are introducing reference operational solutions. Among them, the analysis of the correlation between the log and parsing log heterogeneity requires considerable time and manpower. In this study, we create a rule for the security scenario based on parsing techniques to extract and parse the log of the log using only meaningful data and propose a method for purifying that can detect an intelligent security threat.
引用
收藏
页码:629 / 635
页数:7
相关论文
共 50 条
  • [41] Various Security Threats and Their Solutions In Cloud Computing
    Barnwal, Anil
    Pugla, Satyakam
    Jangade, Rajesh
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 758 - 764
  • [42] Data Security in Cloud Computing: Threats and Countermeasures
    Chen, Yi-Fan
    Suo, Hui
    Liu, Zhuo-Hua
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 181 - 185
  • [43] Cloud of Things (CoTs): Security Threats and Attacks
    Almtrafi, Sara Mutlaq
    Alkhudadi, Bdour Abduallatif
    Alsuwat, Hatim
    Alsuwat, Emad
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (08): : 229 - 237
  • [44] Cloud security: Emerging threats and current solutions
    Coppolino, Luigi
    D'Antonio, Salvatore
    Mazzeo, Giovanni
    Romano, Luigi
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 126 - 140
  • [45] IT Security Threats in Cloud Computing Sourcing Model
    Rot, Artur
    Sobinska, Malgorzata
    2013 FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS (FEDCSIS), 2013, : 1153 - 1156
  • [46] Vulnerabilities and Threats in Cloud Software Engineering Security
    Yu, Weider D.
    Runiassy, Maryam
    Yin, Yijun
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 1822 - 1831
  • [47] Cloud Computing Security Challenges, Threats and Vulnerabilities
    Sasubilli, Manoj Kumar
    Venkateswarlu, R.
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2021), 2021, : 476 - 480
  • [48] Cloud Computing Threats and Provider Security Assessment
    Yu, Huiming
    Williams, Ken
    Yuan, Xiaohong
    ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2015, 2015, 9532 : 238 - 250
  • [49] Exploration of Various Cloud Security Challenges and Threats
    Chitturi, Arun Krishna
    Swarnalatha, Purushotham
    SOFT COMPUTING FOR PROBLEM SOLVING, SOCPROS 2018, VOL 2, 2020, 1057 : 891 - 899
  • [50] Research on security threats and Countermeasures for Cloud Computing
    Mi, Qing
    Ni, Zhen-tao
    Wang, Xiao-duan
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING, 2015, 17 : 322 - 327