Corpus ID: 17006149

Handling of Incident , Challenges , Risks , Vulnerability and Implementing Detection approaches inside the Cloud

  title={Handling of Incident , Challenges , Risks , Vulnerability and Implementing Detection approaches inside the Cloud},
  author={Deepak Kumar and A. Tyagi and Sadique Nayeem},
In a malicious cloud system, handling of incident, challenges and risks, is an integral part of security management. In this paper we discuss various detection and analysis of security incidents as well as the subsequent response (i.e., containment, eradication, and recovery.) On side of existing processes and methods for incident and risk handling is geared towards infrastructures and operational models that will be increasingly outdated by cloud computing. So to update these systems on time… Expand
Clustering Based Incident Handling For Anomaly Detection in Cloud Infrastructures
This research focuses in identifying anomalies and suspicious activities that might happen inside a Cloud Infrastructure over available datasets, where a network statistics dataset the NSL-KDD is chosen as the model to be worked upon, such that it can mirror the Cloud Infrastructure and its components. Expand
Providing trust enabled services in vehicular cloud computing
  • A. Tyagi, Sreenath Niladhuri
  • Computer Science
  • 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS)
  • 2016
Cloud Computing, the long-held dream of computing as a utility has the potential to transform (run) every service on a single platform. Today's cloud computing has become the buzzword (i.e. pay asExpand


Towards incident handling in the cloud: challenges and approaches
The identified approaches provide guidance for cloud customers and cloud service providers towards effective incident handling in the cloud and the identified challenges may serve as basis for a research agenda in cloud incident handling. Expand
Infrastructure as a service security: Challenges and solutions
This paper presents an elaborated study of IaaS components' security and determines vulnerabilities and countermeasures, and proposes a Security Model for IAAS (SMI) to guide security assessment and enhancement in IaaA layer. Expand
Cloud Security Issues
Some security issues that have to be included in service level agreements (SLA) are put forward to help some of the enterprises to look forward in using the cloud services. Expand
A survey of risks, threats and vulnerabilities in cloud computing
This paper highlights and categorizes many of security issues introduced by the "cloud"; surveys the risks, threats and vulnerabilities, and makes the necessary recommendations that can help promote the benefits and mitigate the risks associated with Cloud Computing. Expand
Intrusion Detection in the Cloud
  • S. Roschke, F. Cheng, C. Meinel
  • Computer Science
  • 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
  • 2009
Several requirements for deploying IDS in the Cloud are summarized and an extensible IDS architecture for being easily used in a distributed cloud infrastructure is proposed. Expand
Handbook for Computer Security Incident Response Teams (CSIRTs)
Abstract : This document provides guidance on the generic issues to consider when forming and operating a computer security incident response team (OSIRT). In particular, it helps an organization toExpand
Research Challenges for Enterprise Cloud Computing
This paper discusses some of the research challenges for cloud computing from an enterprise or organizational perspective, and puts them in context by reviewing the existing body of literature in cloud computing. Expand
Cloud Security Is Not (Just) Virtualization Security
This work presents a solution that is highly scalable, centralizes guest protection into a security VM, supports Linux and Windows operating systems and can be easily extended to support new operating systems, and does not assume any a-priori semantic knowledge of the guest. Expand
Computer Security Incident Handling Guide
This guideline should not be held as binding to law enforcement personnel relative to the investigation of criminal activity, and should be interpreted as altering or superseding the existing authorities of the Secretary of Commerce, Director of the OMB, or any other Federal official. Expand
What's New About Cloud Computing Security?
This work strives to frame the full space of cloud-computing security issues, attempting to separate justified concerns from possible over-reactions, and argues that two facets are to some degree new and fundamental to cloud computing: the complexities of multi-party trust considerations, and the ensuing need for mutual auditability. Expand