Utilizing Cloud Computing Log Events for Security Automation

dc.contributor.author Farrag, Khalid
dc.contributor.department Electrical and Computer Engineering
dc.contributor.majorProfessor DOUG JACOBSON
dc.date 2020-01-07T19:59:41.000
dc.date.accessioned 2020-06-30T01:34:38Z
dc.date.available 2020-06-30T01:34:38Z
dc.date.copyright Tue Jan 01 00:00:00 UTC 2019
dc.date.issued 2019-01-01
dc.description.abstract <p>The rising use of cloud computing and deploying and managing applications and services on a large-scale demand researcher to utilize cloud-logs to achieve greater continuous of security and compliance. Cloud security auto-remediation not only essential for preventing a potential breach, but also essential to prevent system frailer or accidents, and for complying with compliance requirements or legal actions. However, now most of cloud hosting services provide cloud trails or logs to identify and track security incidents. But that isn’t enough without acting at the event time.</p> <p>In this research, I present a novel approach for automatic security remediation that can be built from a noisy and unstructured cloud logs. The approach utilizing cloud trails logs. Examining the records syntax will provide the complete picture of actions taken by a user, role, captured API calls for systems events.</p> <p>Also, it is necessary to understand how log events can be constructed to build a strong remediation policy. In some parts, cloud providers have had little incentive to provide broad administrative access to the set of information, and that often do not provide the adequate log that can be used for security auditing or compliance. However, the ultimate goal of this research is to connect the dots of deferent events to build a strong cloud security auto-remediation policy.</p>
dc.format.mimetype PDF
dc.identifier archive/lib.dr.iastate.edu/creativecomponents/386/
dc.identifier.articleid 1492
dc.identifier.contextkey 15944449
dc.identifier.s3bucket isulib-bepress-aws-west
dc.identifier.submissionpath creativecomponents/386
dc.identifier.uri https://dr.lib.iastate.edu/handle/20.500.12876/16940
dc.source.bitstream archive/lib.dr.iastate.edu/creativecomponents/386/Khalid_Farrag_Creative_Component_11_05_2019__1_.pdf|||Fri Jan 14 23:53:46 UTC 2022
dc.subject.disciplines Electrical and Computer Engineering
dc.subject.keywords security
dc.subject.keywords cloud computing
dc.subject.keywords log
dc.title Utilizing Cloud Computing Log Events for Security Automation
dc.type article
dc.type.genre creativecomponent
dspace.entity.type Publication
relation.isOrgUnitOfPublication a75a044c-d11e-44cd-af4f-dab1d83339ff
thesis.degree.discipline Information Assurance
thesis.degree.level creativecomponent
File
Original bundle
Now showing 1 - 1 of 1
Name:
Khalid_Farrag_Creative_Component_11_05_2019__1_.pdf
Size:
715.41 KB
Format:
Adobe Portable Document Format
Description: