Utilizing Cloud Computing Log Events for Security Automation
Utilizing Cloud Computing Log Events for Security Automation
dc.contributor.author | Farrag, Khalid | |
dc.contributor.department | Electrical and Computer Engineering | |
dc.contributor.majorProfessor | DOUG JACOBSON | |
dc.date | 2020-01-07T19:59:41.000 | |
dc.date.accessioned | 2020-06-30T01:34:38Z | |
dc.date.available | 2020-06-30T01:34:38Z | |
dc.date.copyright | Tue Jan 01 00:00:00 UTC 2019 | |
dc.date.issued | 2019-01-01 | |
dc.description.abstract | <p>The rising use of cloud computing and deploying and managing applications and services on a large-scale demand researcher to utilize cloud-logs to achieve greater continuous of security and compliance. Cloud security auto-remediation not only essential for preventing a potential breach, but also essential to prevent system frailer or accidents, and for complying with compliance requirements or legal actions. However, now most of cloud hosting services provide cloud trails or logs to identify and track security incidents. But that isn’t enough without acting at the event time.</p> <p>In this research, I present a novel approach for automatic security remediation that can be built from a noisy and unstructured cloud logs. The approach utilizing cloud trails logs. Examining the records syntax will provide the complete picture of actions taken by a user, role, captured API calls for systems events.</p> <p>Also, it is necessary to understand how log events can be constructed to build a strong remediation policy. In some parts, cloud providers have had little incentive to provide broad administrative access to the set of information, and that often do not provide the adequate log that can be used for security auditing or compliance. However, the ultimate goal of this research is to connect the dots of deferent events to build a strong cloud security auto-remediation policy.</p> | |
dc.format.mimetype | ||
dc.identifier | archive/lib.dr.iastate.edu/creativecomponents/386/ | |
dc.identifier.articleid | 1492 | |
dc.identifier.contextkey | 15944449 | |
dc.identifier.s3bucket | isulib-bepress-aws-west | |
dc.identifier.submissionpath | creativecomponents/386 | |
dc.identifier.uri | https://dr.lib.iastate.edu/handle/20.500.12876/16940 | |
dc.source.bitstream | archive/lib.dr.iastate.edu/creativecomponents/386/Khalid_Farrag_Creative_Component_11_05_2019__1_.pdf|||Fri Jan 14 23:53:46 UTC 2022 | |
dc.subject.disciplines | Electrical and Computer Engineering | |
dc.subject.keywords | security | |
dc.subject.keywords | cloud computing | |
dc.subject.keywords | log | |
dc.title | Utilizing Cloud Computing Log Events for Security Automation | |
dc.type | article | |
dc.type.genre | creativecomponent | |
dspace.entity.type | Publication | |
relation.isOrgUnitOfPublication | a75a044c-d11e-44cd-af4f-dab1d83339ff | |
thesis.degree.discipline | Information Assurance | |
thesis.degree.level | creativecomponent |
File
Original bundle
1 - 1 of 1
- Name:
- Khalid_Farrag_Creative_Component_11_05_2019__1_.pdf
- Size:
- 715.41 KB
- Format:
- Adobe Portable Document Format
- Description: