public cloud security via ids
Definition
Benefits   of using public cloud
 Identity management
 Physical and personnel security
 Availability
 Application security
 Highly fragmented market
 Lack of sufficient standards
 Data lock-in
 Security threats
 Service outedges
public cloud security via ids
   1. Select the Right Apps for the Public
    Cloud.
   2. Evaluate and Add Security, If Necessary
   3. Identify and Use the Right Third-Party
    Auditing Services
   4. Add Authentication Layers
   5. Consider How Additional Security Will
    Affect Integration
   6.IDS
   Definition
   An IDS is a software or hardware based system that
    monitors network traffic and monitors for
    suspicious activity and alerts the system or network
    administrator
     Types
1.    Host-Based Intrusion Detection
      system (HIDS)
2.    Network-Based Intrusion Detection
      system (NIDS)
public cloud security via ids
 Signature
 Alerts
 Logs
 FalseAlarms
 Sensor
   Snort is an example of an IDS
   Snort is a very flexible network IDS that has
    a large set of preconfigured rules. It also
    allows you to write your own rule set
 Functions:
1.   It can serve as a packet sniffer
2.   It can work as a packet logger
3.   It can work as a NIDS

                                                    10
 Run  unattended for extended
  periods of time
 Stay active and secure
 Recognize unusual activity
 Operate without unduly affecting
  the system’s activity
 Configurable


                                     11
public cloud security via ids

More Related Content

PPTX
Intrusion prevention systems
PPTX
Intrusion prevention system(ips)
PPTX
IDS, IPS, IDPS
PPTX
Introduction to Intrusion detection and prevention system for network
PPTX
Intrusion detection system
PPTX
Intrusion Prevention Systems
PPTX
Five Major Types of Intrusion Detection System (IDS)
PPT
Intrusion Detection And Prevention
Intrusion prevention systems
Intrusion prevention system(ips)
IDS, IPS, IDPS
Introduction to Intrusion detection and prevention system for network
Intrusion detection system
Intrusion Prevention Systems
Five Major Types of Intrusion Detection System (IDS)
Intrusion Detection And Prevention

What's hot (20)

PDF
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
PPT
Introduction To Intrusion Detection Systems
DOCX
Network security
PPT
IDS and IPS
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PPTX
Network intrusion detection system and analysis
PPT
Network Intrusion Detection System Using Snort
PDF
IDS/IPS security
PPTX
Network security
PPT
Network-Based Intrusion Detection System
PPTX
Impact to it security of incorrect configuration of firewall policies and thi...
PPTX
Network security
DOCX
Intrusion Detection System
PPTX
Intrusion Detection System(IDS)
PPTX
Intrusion dDetection
PPT
Lecture 5
PPTX
Intrusion Prevention System
PPT
Intrusion detection system ppt
PPTX
Intrusion detection system IDS
PPTX
Future Prediction: Network Intrusion Detection System in the cloud
Signature-Based or Anomaly-Based Intrusion Detection: The Merits and Demerits
Introduction To Intrusion Detection Systems
Network security
IDS and IPS
Intrusion Detection Systems and Intrusion Prevention Systems
Network intrusion detection system and analysis
Network Intrusion Detection System Using Snort
IDS/IPS security
Network security
Network-Based Intrusion Detection System
Impact to it security of incorrect configuration of firewall policies and thi...
Network security
Intrusion Detection System
Intrusion Detection System(IDS)
Intrusion dDetection
Lecture 5
Intrusion Prevention System
Intrusion detection system ppt
Intrusion detection system IDS
Future Prediction: Network Intrusion Detection System in the cloud
Ad

Similar to public cloud security via ids (20)

PDF
CNIT 140: Perimeter Security
PDF
Intrusion_Detection_By_loay_elbasyouni
PPTX
Introduction to IDS & IPS - Part 1
PPT
Intrusion Detection System
PDF
IPS (intrusion prevention system)
PDF
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
PPT
Intrusion .ppt
PPTX
Information Security.pptx
PDF
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
PDF
Ch13 Ids
PPTX
Snort IDS/IPS Basics
PPTX
Intrusion Detection Systems.pptx
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PDF
The Role of Intrusion Detection Systems in Network Security.pdf
PPTX
IDS VS IPS.pptx
PDF
Intrusion Detection System using AI and Machine Learning Algorithm
PDF
Efficient String Matching Algorithm for Intrusion Detection
PDF
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
PDF
Survey on Host and Network Based Intrusion Detection System
PDF
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
CNIT 140: Perimeter Security
Intrusion_Detection_By_loay_elbasyouni
Introduction to IDS & IPS - Part 1
Intrusion Detection System
IPS (intrusion prevention system)
NETWORK SECURITY USING LINUX INTRUSION DETECTION SYSTEM
Intrusion .ppt
Information Security.pptx
Exploring the Insights of Intrusion Detection Systems in Cybercrime.pdf
Ch13 Ids
Snort IDS/IPS Basics
Intrusion Detection Systems.pptx
The Role of Intrusion Detection Systems in Network Security.pdf
The Role of Intrusion Detection Systems in Network Security.pdf
IDS VS IPS.pptx
Intrusion Detection System using AI and Machine Learning Algorithm
Efficient String Matching Algorithm for Intrusion Detection
Network Based Intrusion Detection and Prevention Systems: Attack Classificati...
Survey on Host and Network Based Intrusion Detection System
Automatic Intrusion Detection based on Artificial Intelligence Techniques: A ...
Ad

More from أحلام انصارى (20)

PPTX
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
PPTX
Intention recognition for dynamic role exchange in haptic
PPT
Noise Adaptive Training for Robust Automatic Speech Recognition
PPTX
Human behaviour analysis based on New motion descriptor
PPTX
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
PDF
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
PPTX
Security issues in cloud database
PPTX
Html5 offers 5 times better ways to hijack the website
PPTX
Honey pot in cloud computing
PPT
grid authentication
PPTX
Security As A Service In Cloud(SECaaS)
PPT
Dos presentation by ahlam shakeel
PPTX
Password craking techniques
PPT
Operating system vulnerability and control
PPT
Network ssecurity toolkit
PPTX
Image forgery and security
PPTX
Image based authentication
An Enhanced Independent Component-Based Human Facial Expression Recognition ...
Intention recognition for dynamic role exchange in haptic
Noise Adaptive Training for Robust Automatic Speech Recognition
Human behaviour analysis based on New motion descriptor
Recognizing Human-Object Interactions in Still Images by Modeling the Mutual ...
Multimodal Biometric Human Recognition for Perceptual Human–Computer Interaction
Security issues in cloud database
Html5 offers 5 times better ways to hijack the website
Honey pot in cloud computing
grid authentication
Security As A Service In Cloud(SECaaS)
Dos presentation by ahlam shakeel
Password craking techniques
Operating system vulnerability and control
Network ssecurity toolkit
Image forgery and security
Image based authentication

public cloud security via ids

  • 2. Definition Benefits of using public cloud
  • 3.  Identity management  Physical and personnel security  Availability  Application security
  • 4.  Highly fragmented market  Lack of sufficient standards  Data lock-in  Security threats  Service outedges
  • 6. 1. Select the Right Apps for the Public Cloud.  2. Evaluate and Add Security, If Necessary  3. Identify and Use the Right Third-Party Auditing Services  4. Add Authentication Layers  5. Consider How Additional Security Will Affect Integration  6.IDS
  • 7. Definition  An IDS is a software or hardware based system that monitors network traffic and monitors for suspicious activity and alerts the system or network administrator  Types 1. Host-Based Intrusion Detection system (HIDS) 2. Network-Based Intrusion Detection system (NIDS)
  • 9.  Signature  Alerts  Logs  FalseAlarms  Sensor
  • 10. Snort is an example of an IDS  Snort is a very flexible network IDS that has a large set of preconfigured rules. It also allows you to write your own rule set  Functions: 1. It can serve as a packet sniffer 2. It can work as a packet logger 3. It can work as a NIDS 10
  • 11.  Run unattended for extended periods of time  Stay active and secure  Recognize unusual activity  Operate without unduly affecting the system’s activity  Configurable 11