| Peer-Reviewed

Cyber Security Architecture Components for Cloud Network

Received: 8 August 2022     Accepted: 29 August 2022     Published: 30 November 2022
Views:       Downloads:
Abstract

The cyber security landscape is constantly evolving and changing with attackers developing new tools and techniques to access organizations' systems and data. Public and private organizations are finding it increasingly difficult to defend their systems and data from these constantly changing, evolving, and persistent threats. Therefore, it is empirical and critical that both business and government agencies protect their systems and data from potential risks arising from these threats for business or organization continuity. Cybercriminals often target the networks to launch attacks on the organization-targeted systems with the intention to gain access and either steal, alter or destroy value data. These attacks may include Malware, DDoS, SQL injection, Phishing, XSS, Botnets, and many more. Cloud adoption has fundamentally changed the way applications are delivered and consumed. Traditional networks lack the security and performance capabilities and therefore cannot support these new cloud challenges. This paper proposes an architecture with built-in algorithms to detect both new and old threats. The paper starts with an analysis of the challenges for intelligent networks. The second part looks at related works that have been carried out in relation to cybersecurity in networks. The third part proposes an architecture with an algorithm built in to detect new threats to the networks. Finally, the last part deals with the implementation of the architecture.

Published in Internet of Things and Cloud Computing (Volume 10, Issue 3)
DOI 10.11648/j.iotcc.20221003.11
Page(s) 33-36
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2022. Published by Science Publishing Group

Keywords

Cloud Networks, Cloud Services, Cyber-Attacks, Traditional Networks, Cyber Security, Big Data, Machine Learning

References
[1] S. Puri, M. Agnihotri, “A Proactive approach for cyber attack mitigation in cloud network,” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
[2] A. Shameli-Sendi, Y. Jarraya, M. Pourzandi, M. Cheriet, “Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns” IEEE Transactions on Services Computing, 2019, vol. 12, issue 4.
[3] M. B. Sridhar, A. Koushik, “A Study of Big Data Analytics in Clouds with a Security Perspective,” International Journal of Engineering Research & Technology (IJERT), 2017, vol. 6, issue 1.
[4] R. Savold, N. Dagher, P. Frazier, D. McCallam, “Architecting Cyber Defense: A Survey of the Leading Cyber Reference Architectures and Frameworks,” IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), 2017.
[5] A. Giehl, S. Plaga, “Implementing a performant security control for Industrial Ethernet,” International Conference on Signal Processing and Information Security (ICSPIS), 2018.
[6] B. Gokaraju, R. Agrawal, D. A. Doss, S. Bhattacharya, “Identification of Spatio-Temporal Patterns in Cyber Security for Detecting the Signature Identity of Hacker,” SoutheastCon, 2018.
[7] S. Sen, C. Jayawardena, “Analysis of Cyber-Attack in Big Data IoT and Cyber-Physical Systems - A Technical Approach to Cybersecurity Modeling,” IEEE 5th International Conference for Convergence in Technology (I2CT), 2019.
[8] L. Wang, R. Jones, “Big Data Analytics of Network Traffic and Attacks,” IEEE National Aerospace and Electronics Conference (NAECON), 2018.
[9] D. S. Terzi, R. Terzi, S. Sagiroglu, “Big data analytics for network anomaly detection from netflow data,” International Conference on Computer Science and Engineering (UBMK), 2017.
[10] C. Zhang, X. Shen, X. Pei, Y. Yao, “Applying Big Data Analytics Into Network Security: Challenges, Techniques and Outlooks,” IEEE International Conference on Smart Cloud (Smart Cloud), 2016.
[11] C. B. M. Reddy, U. k. Reddy, E. Brumancia, R. M. Gomathi, K. Indira, “Integrative Approach Of Big Data And Network Attacks Analysis In Cloud Environment,” 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184), 2020.
[12] Y. S. K. Vani, Krishnamurthy, “Survey anomaly detection in network using big data analytics,” International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS), 2017.
[13] Y. Wu, D. Wei, J. Feng, “Network Attacks Detection Methods Based on Deep Learning Techniques: A Survey,” Security and Communication Networks, Vol. 2020.
[14] M. Aljabri, S. S. Aljameel, R. M. A. Mohammad, S. H. Almotiri, S. Mirza, F. M. Anis, M. Aboulnour, D. M. Alomari, D. H. Alhamed, H. S. Altamimi, “Intelligent Techniques for Detecting Network Attacks: Review and Research Directions,” Sensors 2021.
[15] A. Bilen, A. B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Computer Science, April 2021.
[16] B. Arpitha, R. Sharan, B. Brunda, D. Indrakumar, B. E. Ramesh, “Cyber Attack Detection and notifying system using ML Techniques,” IJESC, 2021. Vol. 11. Issue No. 06.
[17] M. Chalé, N. D. Bastian, J. Weir, “Algorithm Selection Framework for Cyber Attack Detection,” WiseML, 2020.
[18] G. Buchgeher, R. Weinreich, “Connecting Architecture and Implementation,” Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems, 2009.
Cite This Article
  • APA Style

    Thierry Mbah Mbelli. (2022). Cyber Security Architecture Components for Cloud Network. Internet of Things and Cloud Computing, 10(3), 33-36. https://doi.org/10.11648/j.iotcc.20221003.11

    Copy | Download

    ACS Style

    Thierry Mbah Mbelli. Cyber Security Architecture Components for Cloud Network. Internet Things Cloud Comput. 2022, 10(3), 33-36. doi: 10.11648/j.iotcc.20221003.11

    Copy | Download

    AMA Style

    Thierry Mbah Mbelli. Cyber Security Architecture Components for Cloud Network. Internet Things Cloud Comput. 2022;10(3):33-36. doi: 10.11648/j.iotcc.20221003.11

    Copy | Download

  • @article{10.11648/j.iotcc.20221003.11,
      author = {Thierry Mbah Mbelli},
      title = {Cyber Security Architecture Components for Cloud Network},
      journal = {Internet of Things and Cloud Computing},
      volume = {10},
      number = {3},
      pages = {33-36},
      doi = {10.11648/j.iotcc.20221003.11},
      url = {https://doi.org/10.11648/j.iotcc.20221003.11},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.iotcc.20221003.11},
      abstract = {The cyber security landscape is constantly evolving and changing with attackers developing new tools and techniques to access organizations' systems and data. Public and private organizations are finding it increasingly difficult to defend their systems and data from these constantly changing, evolving, and persistent threats. Therefore, it is empirical and critical that both business and government agencies protect their systems and data from potential risks arising from these threats for business or organization continuity. Cybercriminals often target the networks to launch attacks on the organization-targeted systems with the intention to gain access and either steal, alter or destroy value data. These attacks may include Malware, DDoS, SQL injection, Phishing, XSS, Botnets, and many more. Cloud adoption has fundamentally changed the way applications are delivered and consumed. Traditional networks lack the security and performance capabilities and therefore cannot support these new cloud challenges. This paper proposes an architecture with built-in algorithms to detect both new and old threats. The paper starts with an analysis of the challenges for intelligent networks. The second part looks at related works that have been carried out in relation to cybersecurity in networks. The third part proposes an architecture with an algorithm built in to detect new threats to the networks. Finally, the last part deals with the implementation of the architecture.},
     year = {2022}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Cyber Security Architecture Components for Cloud Network
    AU  - Thierry Mbah Mbelli
    Y1  - 2022/11/30
    PY  - 2022
    N1  - https://doi.org/10.11648/j.iotcc.20221003.11
    DO  - 10.11648/j.iotcc.20221003.11
    T2  - Internet of Things and Cloud Computing
    JF  - Internet of Things and Cloud Computing
    JO  - Internet of Things and Cloud Computing
    SP  - 33
    EP  - 36
    PB  - Science Publishing Group
    SN  - 2376-7731
    UR  - https://doi.org/10.11648/j.iotcc.20221003.11
    AB  - The cyber security landscape is constantly evolving and changing with attackers developing new tools and techniques to access organizations' systems and data. Public and private organizations are finding it increasingly difficult to defend their systems and data from these constantly changing, evolving, and persistent threats. Therefore, it is empirical and critical that both business and government agencies protect their systems and data from potential risks arising from these threats for business or organization continuity. Cybercriminals often target the networks to launch attacks on the organization-targeted systems with the intention to gain access and either steal, alter or destroy value data. These attacks may include Malware, DDoS, SQL injection, Phishing, XSS, Botnets, and many more. Cloud adoption has fundamentally changed the way applications are delivered and consumed. Traditional networks lack the security and performance capabilities and therefore cannot support these new cloud challenges. This paper proposes an architecture with built-in algorithms to detect both new and old threats. The paper starts with an analysis of the challenges for intelligent networks. The second part looks at related works that have been carried out in relation to cybersecurity in networks. The third part proposes an architecture with an algorithm built in to detect new threats to the networks. Finally, the last part deals with the implementation of the architecture.
    VL  - 10
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Assupol Life, Pretoria, South Africa

  • Sections