{"title":"Intrusion detection in cloud computing based attacks patterns and risk assessment","authors":"B. Youssef, M. Nada, B. Elmehdi, Regragui Boubker","doi":"10.1109/SYSCO.2016.7831341","DOIUrl":null,"url":null,"abstract":"This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS) deployed in cloud services with data of risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability to detect the impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will minimize the false positive alerts and will improve the performance of the IDS.","PeriodicalId":328833,"journal":{"name":"2016 Third International Conference on Systems of Collaboration (SysCo)","volume":"228 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Third International Conference on Systems of Collaboration (SysCo)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SYSCO.2016.7831341","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
This paper focuses on detecting and analyzing cyber-attacks in cloud environment, it represents a novel approach of detecting cyber-attacks by analyzing attacks pattern using risk assessment methodologies. The aims of our solution is to combine evidences obtained from Intrusion Detection Systems (IDS) deployed in cloud services with data of risk assessment related to each attack pattern. Our approach presents a new qualitative solution for analyzing each symptom, indicator and vulnerability to detect the impact and likelihood of distributed and multi-steps attacks directed to cloud environments. The implementation of this approach will minimize the false positive alerts and will improve the performance of the IDS.