Irfan et al., 2015 - Google Patents
Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environmentIrfan et al., 2015
View PDF- Document ID
- 11035500105782554513
- Author
- Irfan M
- Abbas H
- Iqbal W
- Publication year
- Publication venue
- 2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)
External Links
Snippet
Cloud computing is the emerging field nowadays and it has truly revolutionized the domain of Information Technology. This domain is very large and not easy to handle especially when it comes to the forensic in a cloud environment that is considered a very cumbersome …
- 238000004458 analytical method 0 title abstract description 26
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing packet switching networks
- H04L43/02—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
- H04L43/026—Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Arfeen et al. | Endpoint detection & response: A malware identification solution | |
Sohal et al. | A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments | |
US10560434B2 (en) | Automated honeypot provisioning system | |
Bhatt et al. | Towards a framework to detect multi-stage advanced persistent threats attacks | |
Kebande et al. | Novel digital forensic readiness technique in the cloud environment | |
US11080392B2 (en) | Method for systematic collection and analysis of forensic data in a unified communications system deployed in a cloud environment | |
Almohannadi et al. | Cyber threat intelligence from honeypot data using elasticsearch | |
US10454950B1 (en) | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks | |
US10291654B2 (en) | Automated construction of network whitelists using host-based security controls | |
Gul et al. | Distributed cloud intrusion detection model | |
WO2018025157A1 (en) | Deploying deception campaigns using communication breadcrumbs | |
Alsafi et al. | Idps: An integrated intrusion handling model for cloud | |
Irfan et al. | A framework for cloud forensics evidence collection and analysis using security information and event management | |
Kheirkhah et al. | An experimental study of ssh attacks by using honeypot decoys | |
Sree et al. | Data collection techniques for forensic investigation in cloud | |
Santoso et al. | Designing Network Intrusion and Detection System using signature-based method for protecting OpenStack private cloud | |
Boukebous et al. | A comparative analysis of Snort 3 and Suricata | |
Ryandy et al. | Xt-pot: Exposing threat category of honeypot-based attacks | |
Borisaniya et al. | Incorporating honeypot for intrusion detection in cloud infrastructure | |
Nursidiq et al. | Cyber threat hunting to detect unknown threats in the enterprise network | |
Zeinali | Analysis of security information and event management (SIEM) evasion and detection methods | |
Irfan et al. | Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment | |
Aljurayban et al. | Framework for cloud intrusion detection system service | |
Uramová et al. | Infrastructure for generating new ids dataset | |
Datta et al. | Review on cloud forensics: An open discussion on challenges and capabilities |