Advancing Cybersecurity: A Comprehensive Approach to Enhance Threat Detection, Analysis, and Trust in Digital Environments

Authors

  • Jyotsna Jonnala Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
  • Pradeepthi Asodi Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
  • Lalith Kumar Uppada Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
  • Charan Chalasani Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.
  • Radhika Rani Chintala Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India.

Keywords:

Cloud Computing, Cybersecurity, Digital Environments, Threat Detection, Threat Analysis

Abstract

The rapid expansion of Internet technologies has ushered in an era of unprecedented connectivity, resulting in vast and vulnerable attacks that demand robust countermeasures. Cloud computing has become integral to modern business, offering scalability and flexibility. Ensuring the security of cloud services remains paramount with a focus on confidentiality, availability, and integrity. Our primary objectives of cloud security services are Intrusion Detection and prevention systems (IDPS), Data-Driven threat analysis, and Trust computation framework for cloud services. IDPS oversees network traffic and system operations in cloud infrastructure to detect and counteract security threats and unauthorized access efforts. Cloud environments generate substantial data, comprising logs, user behaviors, and system events. A Data-Driven threat analysis model leverages this data to identify and analyze security threats and vulnerabilities specific to the cloud. Trust is a fundamental aspect of cloud computing, as users and organizations need to trust cloud service providers with their data and operations. The Trust Computation Framework assesses and quantifies the trustworthiness of cloud services, users, and entities within the cloud ecosystem. By integrating these three core elements, the cloud security service enhances the security of cloud environments, ensuring that unauthorized user behavior is promptly identified and mitigated. Employing this proactive strategy serves to mitigate the likelihood of data breaches, service interruptions, and various security concerns within the cloud environment. It concurrently fosters a sense of trust and transparency, benefiting both businesses and users in the realm of cloud computing.

Downloads

Download data is not yet available.

References

Tabrizchi, H., Kuchaki Rafsanjani, M. “A survey on security challenges in cloud computing: issues, threats, and solutions”. J Supercomput 76, 9493–9532, 2020, doi- 10.1007/s11227-020-03213-1.

Mohammed K. S. Alwaheidi, Shareeful Islam, "Data-Driven Threat Analysis for Ensuring Security in Cloud Enabled Systems",22(15), 5726, 2022, doi-10.3390/s22155726.

Aisha Kanwal Junejo, Imran Ali Jokhio, Tony Jan, "A Multi-Dimensional and Multi-Factor Trust Computation Framework for Cloud Services", 11(13), 1932,2022, doi-10.3390/electronics11131932.

Jour Sheth, Mrs & Bhosale, Sachin & Kadam, Mr & Prof, Asst," Research Paper on Cloud Computing",2021.

D. Stalin David, M. Anam, C. Kaliappan, S. Arun Mozhi Selvi, D. Kumar Sharma, et al., "Cloud security service for identifying unauthorized user behavior," Computers, Materials & Continua, vol. 70, no.2, pp. 2581–2600, 2022.

Abdullah Aljumah, Tariq Ahamed Ahanger, "Cyber security threats, challenges and defense mechanisms in cloud computing",2020, doi-10.1049/it-com.2019.0040.

Mahdi Rabbani, Yong Li Wang, Reza Khoshkangini, Hamed Jelodar, Ruxin Zhao, Peng Hu, “A hybrid machine learning approach for malicious behavior detection and recognition in cloud computing”, Journal of Network and Computer Applications, Vol: 151,2020,102507, 2020, ISSN 1084-8045, doi- 10.1016/j.jnca.2019.102507.

El Kafhali, S., El Mir, I. & Hanini, M. Security Threats, Defense Mechanisms, "Security Threats, Defense Mechanisms, Challenges, and Future Directions in Cloud Computing”. Arch Computat Methods Eng 29, 223–246. 2022, doi-10.1007/s11831-021-09573-y.

Patrick Vanin, Thomas Newe, Lubna Luxmi Dhirani, Eoin O’Connell, Donna O’Shea, Brian Lee, Muzaffar Rao, "A Study of Network Intrusion Detection Systems Using Artificial Intelligence/Machine Learning",12(22), 11752, 2022, doi-10.3390/app122211752.

Ajay Kumar, K. Abhishek, M.R. Ghalib, A. Shankar, X. Cheng, "Intrusion detection and prevention system for an IoT environment", Digital Communications and Networks, Volume 8, Issue 4,2022, Pages 540-551, ISSN 2352-8648, doi-10.1016/2022.05.027.

Hee-Yong Kwon, Taesic Kim, Mun-Kyu Lee, "Advanced Intrusion Detection Combining Signature-Based and Behavior-Based Detection Methods”, 11(6), 867, 2022, doi-10.3390/11060867.

Bhavsar, M., Roy, K., Kelly, J. et al, "Anomaly-based intrusion detection system for IoT application" Discov Internet Things 3, 5 .2023, doi-10.1007/s43926-023-00034-5.

Jovana Mijalkovic, Angelo Spognardi, "Reducing the False Negative Rate in Deep Learning Based Network Intrusion Detection Systems", 15(8), 258, 2022, doi-10.3390/a15080258.

Movva, P.V.M., Chintala, R.R., “A Brief Survey on Enhanced Quality of Service Mechanisms in Wireless Sensor Network for Secure Data Transmission”, Expert Clouds and Applications (ICOECA), vol 673, 2022, https://doi.org/10.1007/978-981-99-1745-7_22.

B. Reddy Bhimireddy, A. Nimmagadda, H. Kurapati, L. Reddy Gogula, R. Rani Chintala, and V. Chandra Jadala, "Web Security and Web Application Security: Attacks and Prevention”, International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 2095-2096, 2023, doi: 10.1109/ICACCS57279.2023.10112741.

M. Kumar and A. K. Singh, "Distributed Intrusion Detection System using Blockchain and Cloud Computing Infrastructure", International Conference on Trends in Electronics and Informatics (ICOEI), pp. 248-252, 2020, doi: 10.1109/ICOEI48184.2020.9142954.

Victor Chang, Lewis Golightly, Paolo Modesti, Qianwen Ariel Xu, Le Minh Thao Doan, Karl Hall, Sreeja Boddu, Anna Kobusińska, "A Survey on Intrusion Detection Systems for Fog and Cloud Computing", Innovative People-Centered Solutions Applied to Industries, Cities and Societies, 14(3), 89, 2022, https://doi.org/10.3390/fi14030089.

Charan, C., Pradeepthi, A., Jyotsna, J., Lalith, U., Chintala, R.R., Vadlamudi, D, “Big Data Security: Attack’s Detection Methods Using Digital Forensics”, Expert Clouds and Applications (ICOECA), vol 673, 2022, https://doi.org/10.1007/978-981-99-1745-7_7.

Downloads

Published

25.12.2023

How to Cite

Jonnala, J. ., Asodi, P. ., Uppada, L. K. ., Chalasani, C. ., & Chintala, R. R. . (2023). Advancing Cybersecurity: A Comprehensive Approach to Enhance Threat Detection, Analysis, and Trust in Digital Environments. International Journal of Intelligent Systems and Applications in Engineering, 12(2), 588–593. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4302

Issue

Section

Research Article