On Cloud Data Transaction Security Using Encryption and Intrusion Detection

On Cloud Data Transaction Security Using Encryption and Intrusion Detection

Mahmoud Jazzar
Copyright: © 2017 |Pages: 9
DOI: 10.4018/JCIT.2017100102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The rapid increase of cybercrimes and wide-ranging security measures has created an obvious need for deep understanding of security vulnerabilities for Cloud Computing environments, and for best practices addressing such vulnerabilities. Cybercrime activities have affected many regional and international organizational functions and operations. Finding clear and direct evidence of cybercrimes is critical, because huge amounts of data are on networks, and the analysis of such data is complex. This paper propose and discuss a security-enhanced cloud data transaction model for simplifying and filtering cybercrime evidence. The model consumes a number of intrusion-detection sensor inputs that contribute to collecting and fine-tuning large items of evidence at a lower level. A relevant evidence-processing criteria are defined for further reduction and fine-tuning of cybercrime evidence. Initial results of the up-to-date testbed show that it is possible to reduce substantial levels of irrelevant patterns from randomly collected datasets.
Article Preview
Top

Background

According to The CERT Division of SEI (n. d.) and Jazzar (2013) “The best way for administrators to protect their networks is to monitor and analyze their network traffic. Understanding the traffic can help them characterize threats and attacks, and it can also help them identify vulnerabilities in their networks. However, processing traffic on large networks can be time-consuming and expensive, and it may be impossible without effective automation tools…” (p. 4). IDS is an effective network traffic analyzer and defense tool that can analyze and identify vulnerabilities, as well as detect intrusion, exploits, and hostile activities on the system network. This study attempts to support the current IDS by supplementing with an inference monitor system that works in unsupervised learning mode, which can provide adoption, integrity, and an information-sharing platform among the IDS components.

Complete Article List

Search this Journal:
Reset
Volume 26: 1 Issue (2024)
Volume 25: 1 Issue (2023)
Volume 24: 5 Issues (2022)
Volume 23: 4 Issues (2021)
Volume 22: 4 Issues (2020)
Volume 21: 4 Issues (2019)
Volume 20: 4 Issues (2018)
Volume 19: 4 Issues (2017)
Volume 18: 4 Issues (2016)
Volume 17: 4 Issues (2015)
Volume 16: 4 Issues (2014)
Volume 15: 4 Issues (2013)
Volume 14: 4 Issues (2012)
Volume 13: 4 Issues (2011)
Volume 12: 4 Issues (2010)
Volume 11: 4 Issues (2009)
Volume 10: 4 Issues (2008)
Volume 9: 4 Issues (2007)
Volume 8: 4 Issues (2006)
Volume 7: 4 Issues (2005)
Volume 6: 1 Issue (2004)
Volume 5: 1 Issue (2003)
Volume 4: 1 Issue (2002)
Volume 3: 1 Issue (2001)
Volume 2: 1 Issue (2000)
Volume 1: 1 Issue (1999)
View Complete Journal Contents Listing