Intrusion detection attack patterns in cloud computing: trust and risk assessment

Chrysikos, Alexandros (2018) Intrusion detection attack patterns in cloud computing: trust and risk assessment. In: The 12th Advanced Summer School on Service-Oriented Computing, June 24 - June 29 2018, Hersonissos, Crete, Greece.

Abstract

Dependence on cloud services has been steadily increasing in recent years, as cloud services are an attractive option to offer flexibility and cost effectiveness through economies of scale. Cloud services are also exposed to security incidents, such as data breaches and other malicious activities. To mitigate risks to the confidentiality, integrity, and availability of assets, but also minimise loss to cloud service providers and users, the attack trust and risk elements need to be identified, classified, and prioritised. The aim of the proposed conceptual framework is to combine trust and risk assessment sources with data of risk assessment related to each attack pattern. This novel approach is a new qualitative solution to examine and determine symptoms, indicators, and vulnerabilities to detect the impact and likelihood of distributed attacks directed at cloud computing environments. The proposed framework might help to reduce false positive alarms and improve performance in Intrusion Detection Systems.

Documents
3884:20651
[img]
Preview
IBM Research Report Papers From the 12th Advanced Summer School on Service-Oriented Computing (SummerSOC’18)
Intrusion-Detection-Attack-Patterns-in-Cloud-Computing-Trust-and-Risk-Assessment.pdf - Accepted Version

Download (381kB) | Preview
Details
Record
Statistics

Downloads

Downloads per month over past year



Downloads each year

View Item View Item