Comprehensive Cybersecurity Strategies for Cloud Computing: Implementing theMITRE ATT&CK Framework for Enhanced Threat Detection and Defense
سال انتشار: 1403
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 45
فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد
- صدور گواهی نمایه سازی
- من نویسنده این مقاله هستم
استخراج به نرم افزارهای پژوهشی:
شناسه ملی سند علمی:
CELCONF03_035
تاریخ نمایه سازی: 25 مهر 1403
چکیده مقاله:
This article provides an in-depth review of cybersecurity in cloud computing, emphasizing a scientificperspective. By examining key references, including recent studies and incorporating the MITRE ATT&CKframework, this article explores various cloud security threats and their mitigation strategies. Themethodology involves a comprehensive analysis of three seminal works on cloud security, focusing on threatidentification, defense mechanisms, and the application of the MITRE ATT&CK framework. Additionally,insights from SANS SEC ۳۸۸and SANS SEC ۴۸۸courses are incorporated to highlight practical applications andhands-on experiences in cloud security. Discussion points include the benefits of cloud computing, commoncybersecurity threats, defense mechanisms, regulatory considerations, and future research directions. Thisstudy underscores the importance of integrating advanced threat detection techniques and proactivesecurity measures to safeguard cloud environments against evolving cyber threats. Furthermore, itemphasizes the role of collaborative efforts between cloud service providers, researchers, and users indeveloping effective security solutions. By providing a structured approach to understanding and addressingthe complexities of cloud security, this article highlights the critical need for continuous improvement insecurity practices. Ultimately, the conclusion emphasizes the ongoing research required to stay ahead ofevolving threats and ensure the secure adoption of cloud computing technologies across various sectors. Thearticle also examines practical applications and case studies from leading cloud service providers,demonstrating the effectiveness of these strategies in real-world scenarios.
کلیدواژه ها:
نویسندگان
Mehdi Rahimi
Bachelor Student of Professional Computer Engineering – Software at Islamic Azad University,Centeral Branch
Mojtaba KeshavarzSiyahpoosh
PhD student of Professional Computer Engineering – Software at Islamic Azad University, CenteralBranch
SeyedJavad MirAbedini
Assistant professor and faculty member at Software at Islamic Azad University, Centeral Branch