Vuyyuru Sai Venkata Murali Krishna, Tammana Sai Rama Vamsi, S. Kavitha
{"title":"使用EventBridge和Athena实现AWS Aurora的取证分析自动化","authors":"Vuyyuru Sai Venkata Murali Krishna, Tammana Sai Rama Vamsi, S. Kavitha","doi":"10.1109/ICECA55336.2022.10009126","DOIUrl":null,"url":null,"abstract":"The advancement of cyber technology has a tremendous boost over the years which results in a threat to security as one outcome. So, the domain of forensics plays a crucial role in detecting and preventing various cyber threats. As a motto of minimizing hardware storage and computation, industries are moving towards the cloud platform which provides maximum services such as storage, computation, etc. at low cost and also based on the requirement. Therefore, this ideology has attracted several organizations and individuals in moving toward cloud platforms. Hence as an instinct, the threat of the CIA triad has also arrived on the cloud. In every software application, the database plays a major role, as a result, it has become a resource for attackers to gain information which resulted in various attacks on the database. Therefore, database monitoring has become an important role. To monitor or investigate the attack the logs of the database are used. Hence storing the logs is also a challenge since the logs shouldn't lose their integrity. This research work proposes a novel architecture with maximum throughput and a strong storing mechanism to automatically store the logs following a user-defined timeline analysis by using Athena, Lambda, and EventBridge along with strong security features such as encryption, versioning, etc. that guide the monitoring process and forensic analysis.","PeriodicalId":356949,"journal":{"name":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Automation of Forensic Analysis for AWS Aurora using EventBridge and Athena\",\"authors\":\"Vuyyuru Sai Venkata Murali Krishna, Tammana Sai Rama Vamsi, S. Kavitha\",\"doi\":\"10.1109/ICECA55336.2022.10009126\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The advancement of cyber technology has a tremendous boost over the years which results in a threat to security as one outcome. So, the domain of forensics plays a crucial role in detecting and preventing various cyber threats. As a motto of minimizing hardware storage and computation, industries are moving towards the cloud platform which provides maximum services such as storage, computation, etc. at low cost and also based on the requirement. Therefore, this ideology has attracted several organizations and individuals in moving toward cloud platforms. Hence as an instinct, the threat of the CIA triad has also arrived on the cloud. In every software application, the database plays a major role, as a result, it has become a resource for attackers to gain information which resulted in various attacks on the database. Therefore, database monitoring has become an important role. To monitor or investigate the attack the logs of the database are used. Hence storing the logs is also a challenge since the logs shouldn't lose their integrity. This research work proposes a novel architecture with maximum throughput and a strong storing mechanism to automatically store the logs following a user-defined timeline analysis by using Athena, Lambda, and EventBridge along with strong security features such as encryption, versioning, etc. that guide the monitoring process and forensic analysis.\",\"PeriodicalId\":356949,\"journal\":{\"name\":\"2022 6th International Conference on Electronics, Communication and Aerospace Technology\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 6th International Conference on Electronics, Communication and Aerospace Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICECA55336.2022.10009126\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA55336.2022.10009126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Automation of Forensic Analysis for AWS Aurora using EventBridge and Athena
The advancement of cyber technology has a tremendous boost over the years which results in a threat to security as one outcome. So, the domain of forensics plays a crucial role in detecting and preventing various cyber threats. As a motto of minimizing hardware storage and computation, industries are moving towards the cloud platform which provides maximum services such as storage, computation, etc. at low cost and also based on the requirement. Therefore, this ideology has attracted several organizations and individuals in moving toward cloud platforms. Hence as an instinct, the threat of the CIA triad has also arrived on the cloud. In every software application, the database plays a major role, as a result, it has become a resource for attackers to gain information which resulted in various attacks on the database. Therefore, database monitoring has become an important role. To monitor or investigate the attack the logs of the database are used. Hence storing the logs is also a challenge since the logs shouldn't lose their integrity. This research work proposes a novel architecture with maximum throughput and a strong storing mechanism to automatically store the logs following a user-defined timeline analysis by using Athena, Lambda, and EventBridge along with strong security features such as encryption, versioning, etc. that guide the monitoring process and forensic analysis.