As servers move to the cloud, sources for security analysis become more limited. Security teams must make the most of the resources available to them. Our project attempts to fulfill this need by providing a template-based application to analyze and detect security events in logs that are available in cloud environments. We focus on authentication logs, but analysis modules can be added to flag anomalies in any log. The deliverables include log analysis, including successive repeated failures, location-based anomalies, and excessive failed login attempts across multiple accounts. To present our findings we output the results to a web interface for further analysis by a security team. Our project was limited by time, knowledge, available har...
Numerous event-based probing methods exist for cloud computing environments allowing a trusted hyper...
Abstract. Cloud computing is now on the verge of being embraced as a serious usage-model. However, w...
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flex...
Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techni...
Presently, cloud computing seems to be the best option of every IT organization since it gives adapt...
Dependence on cloud services has been steadily increasing in recent years, as cloud services are an ...
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity an...
While the growth of cloud-based technologies has benefited the society tremendously, it has also inc...
Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of t...
Along with the development of intrusion detection systems so far, remarkable results have been achie...
Users are increasingly adopting cloud services for various purposes such as storing and processing d...
Cloud Computing represents both a technology for using computing infrastructures in a more efficient...
The Cloud computing system can be easily threatened by various attacks, because most of the cloud co...
As an asset of Cloud computing, big data is now changing our business models and applications. Rich ...
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious behavior ...
Numerous event-based probing methods exist for cloud computing environments allowing a trusted hyper...
Abstract. Cloud computing is now on the verge of being embraced as a serious usage-model. However, w...
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flex...
Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techni...
Presently, cloud computing seems to be the best option of every IT organization since it gives adapt...
Dependence on cloud services has been steadily increasing in recent years, as cloud services are an ...
An intrusion detection system (IDS) monitors network traffic and monitors for suspicious activity an...
While the growth of cloud-based technologies has benefited the society tremendously, it has also inc...
Masquerade attacks pose a serious threat for cloud system due to the massive amount of resource of t...
Along with the development of intrusion detection systems so far, remarkable results have been achie...
Users are increasingly adopting cloud services for various purposes such as storing and processing d...
Cloud Computing represents both a technology for using computing infrastructures in a more efficient...
The Cloud computing system can be easily threatened by various attacks, because most of the cloud co...
As an asset of Cloud computing, big data is now changing our business models and applications. Rich ...
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious behavior ...
Numerous event-based probing methods exist for cloud computing environments allowing a trusted hyper...
Abstract. Cloud computing is now on the verge of being embraced as a serious usage-model. However, w...
Cloud computing provides scalable, virtualized on-demand services to the end users with greater flex...