Enhancing Cloud Security-Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

被引:3
|
作者
Tuyishime, Emmanuel [1 ]
Balan, Titus C. [1 ]
Cotfas, Petru A. [1 ]
Cotfas, Daniel T. [1 ]
Rekeraho, Alexandre [1 ]
机构
[1] Transilvania Univ Brasov, Elect & Comp Dept, Brasov 500036, Romania
来源
APPLIED SCIENCES-BASEL | 2023年 / 13卷 / 22期
关键词
cloud security; SIEM system; security threats; Microsoft Sentinel; compliance;
D O I
10.3390/app132212359
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications. This research addresses growing security concerns in the cloud by proposing an innovative security information and event management system (SIEM) that offers automated visibility of cloud resources. Our implementation includes a virtual network comprising virtual machines, load balancers, Microsoft Defender for Cloud, and an application gateway that functions as a web application firewall (WAF). This WAF scans incoming Internet traffic and provides centralized protection against common exploits and vulnerabilities, securing web applications within the cloud environment. We deployed the SIEM system to automate visibility and incident response for cloud resources. By harnessing the power of this employed SIEM, the developed system can continuously monitor, detect security incidents, and proactively mitigate potential security threats. Microsoft Defender for Cloud consistently assesses the configuration of cloud resources against industry standards, regulations, and benchmarks to ensure compliance requirements are met. Our findings highlight the practicality and effectiveness of deploying such solutions to safeguard cloud resources, offering valuable insights to organizations and security professionals seeking sustainable and resilient security measures in the cloud computing environment.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A Novel Approach for Security in Cloud-Based Medical Image Storage Using Segmentation
    Marwan, Mbarek
    Kartit, Ali
    Ouahmane, Hassan
    [J]. UBIQUITOUS NETWORKING, UNET 2017, 2017, 10542 : 247 - 258
  • [32] Temporal Intelligence in AI-Enhanced Cyber Forensics using Time-Based Analysis for Proactive Threat Detection
    Dhabliya, Dharmesh
    Gujar, Satish N.
    Dhabliya, Ritika
    Chavan, Gurunath T.
    Kalnawat, Aarti
    Bendale, Shailesh P.
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2023, 19 (03) : 126 - 146
  • [33] Enhancing Cloud Based Information System Security Using the Role and Identity Based Access Control with Fully Homomorphic Encryption
    Altameem, Torki
    [J]. JOURNAL OF MEDICAL IMAGING AND HEALTH INFORMATICS, 2016, 6 (06) : 1445 - 1450
  • [34] Enhancing university network management and security: a real-time monitoring, visualization & cyber attack detection approach using Paessler PRTG and Sophos Firewall
    Fathima, Afrah
    Devi, G. Shree
    [J]. INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2024,
  • [35] Enhancing mobile data security using red panda optimized approach with chaotic fuzzy encryption in mobile cloud computing
    Garg, Vishal
    Kaur, Bikrampal
    Jangra, Surender
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (23):
  • [36] Binarized Spiking Neural Network with blockchain based intrusion detection framework for enhancing privacy and security in cloud computing environment
    Sarveshwaran, Velliangiri
    Pandiaraj, Shanthini
    Bindu, Garikapati
    Ganesan, Vithya
    Swamidason, Iwin Thanakumar Joseph
    [J]. APPLIED SOFT COMPUTING, 2024, 154
  • [37] Enhancing IoT Security Using GA-HDLAD: A Hybrid Deep Learning Approach for Anomaly Detection
    Mutambik, Ibrahim
    [J]. Applied Sciences (Switzerland), 2024, 14 (21):
  • [38] Security analysis of discrete event based threat driven authentication approach in VANET using petri nets
    Malik, Arun
    Pandey, Babita
    [J]. International Journal of Network Security, 2018, 20 (04) : 601 - 608
  • [39] Security Analysis of Cardiovascular Implantable Electronic Device (CIED) using a Threat Model-based Approach
    Chowdhury, N. M. Istiak
    Hasan, Ragib
    [J]. SOUTHEASTCON 2023, 2023, : 88 - 95
  • [40] Security Analysis of a Smart City Traffic Control System using a Threat Model-based Approach
    Alshamrani, Saeed
    Hasan, Ragib
    [J]. SOUTHEASTCON 2023, 2023, : 511 - 517