Intrusion detection in cloud computing based attacks patterns and risk assessment

B. Youssef, M. Nada, B. Elmehdi, Regragui Boubker
{"title":"Intrusion detection in cloud computing based attacks patterns and risk assessment","authors":"B. Youssef, M. Nada, B. Elmehdi, Regragui Boubker","doi":"10.1109/SYSCO.2016.7831341","DOIUrl":null,"url":null,"abstract":"This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS) deployed in cloud services with data of risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability to detect the impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will minimize the false positive alerts and will improve the performance of the IDS.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Systems of Collaboration (SysCo)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSCO.2016.7831341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10

Abstract

This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS) deployed in cloud services with data of risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability to detect the impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will minimize the false positive alerts and will improve the performance of the IDS.
基于攻击模式和风险评估的云计算入侵检测
本文主要研究云环境下的网络攻击检测与分析,提出了一种利用风险评估方法分析攻击模式的网络攻击检测新方法。我们的解决方案的目的是将从部署在云服务中的入侵检测系统(IDS)获得的证据与与每种攻击模式相关的风险评估数据相结合。我们的方法提供了一种新的定性解决方案,用于分析每个症状、指标和漏洞,以检测针对云环境的分布式和多步骤攻击的影响和可能性。这种方法的实现将最大限度地减少误报警报,并将提高IDS的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信