Mejri et al., 2022 - Google Patents
Cloud security issues and log-based proactive strategyMejri et al., 2022
View PDF- Document ID
- 5728264400162449941
- Author
- Mejri O
- Yang D
- Doh I
- Publication year
- Publication venue
- 2022 24th International Conference on Advanced Communication Technology (ICACT)
External Links
Snippet
Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated …
- 200000000015 coronavirus disease 2019 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10230750B2 (en) | Secure computing environment | |
| EP3188436B1 (en) | Platform for protecting small and medium enterprises from cyber security threats | |
| Kent et al. | Guide to computer security log management | |
| Patel | A survey on vulnerability assessment & penetration testing for secure communication | |
| Ravindran et al. | A Review on Web Application Vulnerability Assessment and Penetration Testing. | |
| Yamada et al. | RAT-based malicious activities detection on enterprise internal networks | |
| Tayouri et al. | White paper-cybersecurity in agile cloud computing--cybersecurity guidelines for cloud access | |
| Boulanger | Catapults and grappling hooks: The tools and techniques of information warfare | |
| Avgetidis et al. | Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators | |
| Mejri et al. | Cloud security issues and log-based proactive strategy | |
| Pattanavichai | Comparison for network security scanner tools between GFI LanGuard and Microsoft Baseline Security Analyzer (MBSA) | |
| Kao et al. | A framework for SQL injection investigations: detection, investigation, and forensics | |
| Kent et al. | Sp 800-92. guide to computer security log management | |
| Karie et al. | Cybersecurity incident response in the enterprise | |
| Pandey et al. | Vulnerability scanning | |
| Laitinen | Vulnerabilities in the wild: Detecting vulnerable Web applications at scale | |
| Nilsson et al. | Vulnerability scanners | |
| Shamma | Implementing CIS critical security controls for organizations on a low-budget | |
| Kasmawi et al. | Vulnerability analysis using OWASP ZAP on higher education websites | |
| Kurniawan et al. | File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks | |
| Rao et al. | A Three-Pronged Approach to Mitigate Web Attacks | |
| KR102807674B1 (en) | Method and apparatus for performing attack simulations to enhance cybersecurity | |
| Miloslavskaya | Remote attacks taxonomy and their verbal indicators | |
| Bernardo | Targeted attack detection by means of free and open source solutions | |
| Noman et al. | Log Poisoning Attacks in Internet of Things (IoT) |