Abstract

Cloud computing is one of the most rapidly evolving technologies. Cloud computing has grown in popularity as a result of its benefits such as cost-effectiveness, pay-per-use, scalability, and ease of upgrading. Despite all of these advantages, many firms are hesitant to use cloud environments due to security reasons. The focus of this study is on detecting and identifying theft. It represents a novel way to detecting cyber-attacks in the cloud environment by studying violent attacks patterns using threat assessment techniques. Our solution's goal is to combine information from Intrusion Detection Systems (IDS) implemented in cloud services with risk evaluation data for each attack scenario. Our approach proposes a new qualitative technique for examining each symptom, indication, and risk in order to determine the impact and likelihood of distributed and multi-step attacks against cloud systems. The deployment of this strategy will reduce false positive alarms and improve the IDS' performance.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call