2023
DOI: 10.3390/app132212359
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Cloud Security—Proactive Threat Monitoring and Detection Using a SIEM-Based Approach

Emmanuel Tuyishime,
Titus C. Balan,
Petru A. Cotfas
et al.

Abstract: With the escalating frequency of cybersecurity threats in public cloud computing environments, there is a pressing need for robust security measures to safeguard sensitive data and applications. This research addresses growing security concerns in the cloud by proposing an innovative security information and event management system (SIEM) that offers automated visibility of cloud resources. Our implementation includes a virtual network comprising virtual machines, load balancers, Microsoft Defender for Cloud, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 21 publications
0
3
0
Order By: Relevance
“…Organizations need to develop an effective cloud computing security system for the early detection of threats and errors. They can use SIEM to detect early threats and ensure overall cloud security [33]. Security information and event management is like a guardian responsible for continuously collecting and analyzing data from different sources within the cloud network.…”
Section: Integration Of Siem For Early Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Organizations need to develop an effective cloud computing security system for the early detection of threats and errors. They can use SIEM to detect early threats and ensure overall cloud security [33]. Security information and event management is like a guardian responsible for continuously collecting and analyzing data from different sources within the cloud network.…”
Section: Integration Of Siem For Early Detectionmentioning
confidence: 99%
“…This enables them to actively contribute to protecting sensitive resources and information within the organization. A security-conscious culture of an organization is characterized by a collective recognition of the importance of cybersecurity measures, fostering an environment where all employees are encouraged to report suspicious activities [33]. This culture follows security protocols and is integral to maintaining a secure cloud network.…”
Section: Awareness Training Programs For Usersmentioning
confidence: 99%
“…SIEMs are frequently used to prevent data loss in computer systems and networks. Because of their capacity to instantly detect and address security incidents by monitoring logs and correlating data in real-time, they can be especially helpful in cloud environments [34]. Automating cloud resource visibility is a key advantage of adopting a SIEM-based approach to cloud security.…”
Section: Security Monitoring and Incident Responsementioning
confidence: 99%
“…Automating cloud resource visibility is a key advantage of adopting a SIEM-based approach to cloud security. A virtual network comprising load balancers, virtual machines, and a web application firewall (WAF) that scans incoming Internet traffic and offers centralized protection against common exploits and vulnerabilities can be used to accomplish this [34]. Organizations can proactively mitigate potential security threats in the cloud environment and continuously monitor and detect security incidents by utilizing the power of a SIEM system.…”
Section: Security Monitoring and Incident Responsementioning
confidence: 99%
See 1 more Smart Citation