• Corpus ID: 17006149

Handling of Incident , Challenges , Risks , Vulnerability and Implementing Detection approaches inside the Cloud

@inproceedings{Kumar2012HandlingOI,
  title={Handling of Incident , Challenges , Risks , Vulnerability and Implementing Detection approaches inside the Cloud},
  author={Deepak Kumar and Amit Kumar Tyagi and Sadique Nayeem},
  year={2012}
}
In a malicious cloud system, handling of incident, challenges and risks, is an integral part of security management. In this paper we discuss various detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery.) On side of existing processes and methods for incident and risk handling is geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. So to update these systems on time… 

Figures from this paper

Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
TLDR
This research focuses in identifying anomalies and suspicious activities that might happen inside a Cloud Infrastructure over available datasets, where a network statistics dataset the NSL-KDD is chosen as the model to be worked upon, such that it can mirror the Cloud Infrastructure and its components.
Providing trust enabled services in vehicular cloud computing
  • A. TyagiN. Sreenath
  • Computer Science
    2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS)
  • 2016
Cloud Computing, the long-held dream of computing as a utility has the potential to transform (run) every service on a single platform. Today's cloud computing has become the buzzword (i.e. pay as

References

SHOWING 1-10 OF 46 REFERENCES
Cloud Security Issues
TLDR
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services.
A survey of risks, threats and vulnerabilities in cloud computing
TLDR
This paper highlights and categorizes many of security issues introduced by the "cloud"; surveys the risks, threats and vulnerabilities, and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing.
Intrusion Detection in the Cloud
TLDR
Several requirements for deploying IDS in the Cloud are summarized and an extensible IDS architecture for being easily used in a distributed cloud infrastructure is proposed.
Handbook for Computer Security Incident Response Teams (CSIRTs)
TLDR
This document helps an organization to define and document the nature and scope of a computer security incident response (OSIR) service, which is the core service of a CSlRT.
Research Challenges for Enterprise Cloud Computing
TLDR
This paper discusses some of the research challenges for cloud computing from an enterprise or organizational perspective, and puts them in context by reviewing the existing body of literature in cloud computing.
Cloud Security Is Not (Just) Virtualization Security
TLDR
This work presents a solution that is highly scalable, centralizes guest protection into a security VM, supports Linux and Windows operating systems and can be easily extended to support new operating systems, and does not assume any a-priori semantic knowledge of the guest.
Computer Security Incident Handling Guide
TLDR
This guideline should not be held as binding to law enforcement personnel relative to the investigation of criminal activity, and should be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other Federal official.
What's New About Cloud Computing Security?
TLDR
This work strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions, and argues that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual auditability.
Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds
TLDR
It is shown that it is possible to map the internal cloud infrastructure, identify where a particular target VM is likely to reside, and then instantiate new VMs until one is placed co-resident with the target, and how such placement can then be used to mount cross-VM side-channel attacks to extract information from a target VM on the same machine.
CCOA: Cloud Computing Open Architecture
TLDR
Seven architectural principles are presented and ten interconnected architectural modules are derives to form a reusable and customizable Cloud Computing Open Architecture (CCOA) to guide strategic planning and other consulting practices of Cloud Computing.
...
...