Comprehensive Cybersecurity Strategies for Cloud Computing: Implementing theMITRE ATT&CK Framework for Enhanced Threat Detection and Defense

سال انتشار: 1403
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 45

فایل این مقاله در 10 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

CELCONF03_035

تاریخ نمایه سازی: 25 مهر 1403

چکیده مقاله:

This article provides an in-depth review of cybersecurity in cloud computing, emphasizing a scientificperspective. By examining key references, including recent studies and incorporating the MITRE ATT&CKframework, this article explores various cloud security threats and their mitigation strategies. Themethodology involves a comprehensive analysis of three seminal works on cloud security, focusing on threatidentification, defense mechanisms, and the application of the MITRE ATT&CK framework. Additionally,insights from SANS SEC ۳۸۸and SANS SEC ۴۸۸courses are incorporated to highlight practical applications andhands-on experiences in cloud security. Discussion points include the benefits of cloud computing, commoncybersecurity threats, defense mechanisms, regulatory considerations, and future research directions. Thisstudy underscores the importance of integrating advanced threat detection techniques and proactivesecurity measures to safeguard cloud environments against evolving cyber threats. Furthermore, itemphasizes the role of collaborative efforts between cloud service providers, researchers, and users indeveloping effective security solutions. By providing a structured approach to understanding and addressingthe complexities of cloud security, this article highlights the critical need for continuous improvement insecurity practices. Ultimately, the conclusion emphasizes the ongoing research required to stay ahead ofevolving threats and ensure the secure adoption of cloud computing technologies across various sectors. Thearticle also examines practical applications and case studies from leading cloud service providers,demonstrating the effectiveness of these strategies in real-world scenarios.

نویسندگان

Mehdi Rahimi

Bachelor Student of Professional Computer Engineering – Software at Islamic Azad University,Centeral Branch

Mojtaba KeshavarzSiyahpoosh

PhD student of Professional Computer Engineering – Software at Islamic Azad University, CenteralBranch

SeyedJavad MirAbedini

Assistant professor and faculty member at Software at Islamic Azad University, Centeral Branch