[go: up one dir, main page]

Irfan et al., 2015 - Google Patents

Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment

Irfan et al., 2015

View PDF
Document ID
11035500105782554513
Author
Irfan M
Abbas H
Iqbal W
Publication year
Publication venue
2015 IEEE/ACIS 14th International Conference on Computer and Information Science (ICIS)

External Links

Snippet

Cloud computing is the emerging field nowadays and it has truly revolutionized the domain of Information Technology. This domain is very large and not easy to handle especially when it comes to the forensic in a cloud environment that is considered a very cumbersome …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/02Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data
    • H04L43/026Arrangements for monitoring or testing packet switching networks involving a reduction of monitoring data using flow generation

Similar Documents

Publication Publication Date Title
Arfeen et al. Endpoint detection & response: A malware identification solution
Sohal et al. A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
US10560434B2 (en) Automated honeypot provisioning system
Bhatt et al. Towards a framework to detect multi-stage advanced persistent threats attacks
Kebande et al. Novel digital forensic readiness technique in the cloud environment
US11080392B2 (en) Method for systematic collection and analysis of forensic data in a unified communications system deployed in a cloud environment
Almohannadi et al. Cyber threat intelligence from honeypot data using elasticsearch
US10454950B1 (en) Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10291654B2 (en) Automated construction of network whitelists using host-based security controls
Gul et al. Distributed cloud intrusion detection model
WO2018025157A1 (en) Deploying deception campaigns using communication breadcrumbs
Alsafi et al. Idps: An integrated intrusion handling model for cloud
Irfan et al. A framework for cloud forensics evidence collection and analysis using security information and event management
Kheirkhah et al. An experimental study of ssh attacks by using honeypot decoys
Sree et al. Data collection techniques for forensic investigation in cloud
Santoso et al. Designing Network Intrusion and Detection System using signature-based method for protecting OpenStack private cloud
Boukebous et al. A comparative analysis of Snort 3 and Suricata
Ryandy et al. Xt-pot: Exposing threat category of honeypot-based attacks
Borisaniya et al. Incorporating honeypot for intrusion detection in cloud infrastructure
Nursidiq et al. Cyber threat hunting to detect unknown threats in the enterprise network
Zeinali Analysis of security information and event management (SIEM) evasion and detection methods
Irfan et al. Feasibility analysis for incorporating/deploying SIEM for forensics evidence collection in cloud environment
Aljurayban et al. Framework for cloud intrusion detection system service
Uramová et al. Infrastructure for generating new ids dataset
Datta et al. Review on cloud forensics: An open discussion on challenges and capabilities