+

Mejri et al., 2022 - Google Patents

Cloud security issues and log-based proactive strategy

Mejri et al., 2022

View PDF
Document ID
5728264400162449941
Author
Mejri O
Yang D
Doh I
Publication year
Publication venue
2022 24th International Conference on Advanced Communication Technology (ICACT)

External Links

Snippet

Recently, given the current situation the world is undergoing with the COVID-19 pandemic, a lot of companies encourage remote working from home. As a result, the use of the cloud has increased, but as a consequence, cyberattacks on the cloud systems have escalated …
Continue reading at www.academia.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Similar Documents

Publication Publication Date Title
US10230750B2 (en) Secure computing environment
EP3188436B1 (en) Platform for protecting small and medium enterprises from cyber security threats
Kent et al. Guide to computer security log management
Patel A survey on vulnerability assessment & penetration testing for secure communication
Ravindran et al. A Review on Web Application Vulnerability Assessment and Penetration Testing.
Yamada et al. RAT-based malicious activities detection on enterprise internal networks
Tayouri et al. White paper-cybersecurity in agile cloud computing--cybersecurity guidelines for cloud access
Boulanger Catapults and grappling hooks: The tools and techniques of information warfare
Avgetidis et al. Beyond The Gates: An Empirical Analysis of {HTTP-Managed} Password Stealers and Operators
Mejri et al. Cloud security issues and log-based proactive strategy
Pattanavichai Comparison for network security scanner tools between GFI LanGuard and Microsoft Baseline Security Analyzer (MBSA)
Kao et al. A framework for SQL injection investigations: detection, investigation, and forensics
Kent et al. Sp 800-92. guide to computer security log management
Karie et al. Cybersecurity incident response in the enterprise
Pandey et al. Vulnerability scanning
Laitinen Vulnerabilities in the wild: Detecting vulnerable Web applications at scale
Nilsson et al. Vulnerability scanners
Shamma Implementing CIS critical security controls for organizations on a low-budget
Kasmawi et al. Vulnerability analysis using OWASP ZAP on higher education websites
Kurniawan et al. File Integrity Monitoring as a Method for Detecting and Preventing Web Defacement Attacks
Rao et al. A Three-Pronged Approach to Mitigate Web Attacks
KR102807674B1 (en) Method and apparatus for performing attack simulations to enhance cybersecurity
Miloslavskaya Remote attacks taxonomy and their verbal indicators
Bernardo Targeted attack detection by means of free and open source solutions
Noman et al. Log Poisoning Attacks in Internet of Things (IoT)
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载