A Novel Method to Monitor Threats in Cloud Computing Environment

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2017 by IJCTT Journal
Volume-49 Number-3
Year of Publication : 2017
Authors : K.Arthi, M.Rajeev Kumar, B.Bhagyashree
  10.14445/22312803/IJCTT-V49P127

MLA

K.Arthi, M.Rajeev Kumar, B.Bhagyashree "A Novel Method to Monitor Threats in Cloud Computing Environment". International Journal of Computer Trends and Technology (IJCTT) V49(3):169-178, July 2017. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Cloud Computing did come up with so many attractive advantages such as scalability, flexibility, accessibility, rapid application deployment, and user self-services. However in hindsight, cloud computing makes ensuring security within these environments so much challenging. Therefore traditional security mechanisms such as firewalls and antivirus software have proven insufficient and incapable of dealing with the sheer amount of data and events generated within a Cloud infrastructure. Herein, we present a highly scalable module based system that relies upon Big Data techniques and tools providing a comprehensive solution to process and analyse relevant events (packets flow, logs files) in order to generate an informative decisions that will be handled accordingly and swiftly.[2]As the adoption of Cloud Computing is growing exponentially, a huge sheer amount of data is generated therefore needing to be processed in order to control efficiently what is going within the infrastructure, and also to respond effectively and promptly to security threats. Here in, we provide a highly scalable plug in based and comprehensive solution in order to have a real-time monitoring by reducing the impact of an attack or a particular issue in the overall distributed infrastructure. This work covers a bigger scope in infrastructure security by monitoring all devices that generate log files or generate network traffic. By applying different Big data techniques for Data analysis.

References
[1] Nitin Naik, Paul Jenkins, Nick Savage and Vasilios Katos, ―Big Data Security Analysis Approach Using Computational Intelligence Techniques in R for Desktop Users, The Ninth International Conference on Electronic Measurement &Instruments-ICEMI, Beijing, China 2009.
[2] Kenneth David , Zhaohao Sun, Meta-Analysis of Big Data Security and Privacy@ 2010
[3] Bhagyashri Kulkarni , Varsha Bhosale,― Efficient Storage Utilization Using Erasure Codes in OpenStack Cloud, Proc. of IEEE Int. Conf. , Computing and Communication , Durgapur, India 2016.
[4] Neetu Chaudhari, Satyajee Srivastava ,Big Data Security Issues and challenges @2015
[5] Aditya Dev Mishra ,Youddha Beer Singh,Big Data Analytics for Security and Privacy Challenges@2014
[6] ―Toward a Big Data Architecture for Security Events Analytic Laila Fetjah, Karim Benzidane, Hassan El Alloussi, Othman El Warrak, Said Jai-Andaloussi and Abderrahim Sekkaki @2016 IEEE
[7] ―Big Data: Mining of Log File through HadoopBina Kotiyal, Ankit Kumar, Bhaskar Pant, RH Goudar @2015 IEEE
[8] JianwenWEIt*, YusuZHAot, Kaida JIANG*, Rui XIE* and Yaohui , ―Analysis Farm: A Cloud-based Scalable Aggregation and Query Platform for Network Log Analysis JIN*t @ 2011 IEEE.
[9] ―Application of Big Data Analytics via Cloud Computing Yunus Yetis, RuthvikGoud Sara@ 2016 IEEE
[10] The Analysis of Stereo Vision 3D Point Cloud Data of Autonomous vehicle Obstacle Recognition Li Pei Academy of Armored Forces Engineering, Beijing, China @ 2015 IEEE
[11] https://securityintelligence.com/security-intelligence-and-siem-gets-bigger-with-ease/
[12] http://www.slideshare.net/Hadoop_Summit/t-325p230-ckannanv2
[13] http://www.sciencedirect.com/science/article/pii/S1084804510001281
[14] kibana tutorial
[15] http://www.stackgeek.com/guides/gettingstarted.html
[16] http://www.openstack.com
[17] A. Vijayalakshmi, K. Arthi and P. Vanaja Ranjan, 2013. Network Lifetime Enhancement in Wireless Sensor Networks Using Fuzzy Logic Based Clustering Algorithm. International Journal of Soft Computing, 8: 321-326.

Keywords
Threats, Cloud computing, SIEM, Data Access.