YouTube video of the Project (Security in Cloud Network) : https://youtu.be/Vter7O_6r6c
In the world of rapid evolution, cloud computing is a heavily relied cloud based solution for industries, organizations and personal users. Cloud is used for storing, processing and managing data along with properties like scalability, cost savings, and increased accessibility. With the benefits also comes the harm.
This project covers some of threats in short and one threat in detail to spread awareness about the attacks, its vulnerabilities and its prevention measures.
Hope you like it.
Thank you.
References Used in Our Project :
Introduction references :
[8] HPE What is Network in the cloud?
https://www.hpe.com/emea_europe/en/what-is/network-in-the-cloud.html
[9] red hat – types of clouds https://www.redhat.com/en/topics/cloud-computing/public-cloud-vs-private-cloud-and-hybrid-cloud
Overview of some Cloud Threats References :
https://www.akamai.com/glossary/what-is-cloud-network-security
https://www.investopedia.com/terms/d/denial-service-attack-dos.asp
https://www.linkedin.com/pulse/analyzing-monumental-ddos-attacks-github-2018-2015-baek–sq27c
https://www.sentinelone.com/cybersecurity-101/cloud-security/security-risks-of-cloud-computing
https://learn.microsoft.com/en-us/azure/firewall/firewall-faq
https://hadrian.io/blog/fortifying-the-frontline-how-hackers-exploit-misconfigured-firewalls
https://dl.acm.org/doi/10.1145/3546068#sec-3-2
https://cams.mit.edu/wp-content/uploads/capitalonedatapaper.pdf
https://www.fortinet.com/resources/cyberglossary/security-misconfiguration
https://www.auvik.com/franklyit/blog/insecure-network-protocols
https://www.wiz.io/blog/chaosdb-explained-azures-cosmos-db-vulnerability-walkthrough
https://learn.microsoft.com/en-us/azure/defender-for-cloud/recommendations-reference-networking
Cloud Network Security: Definition, Process & Best Practices
https://www.cloudflare.com/learning/security/glossary/what-is-lateral-movement
https://unit42.paloaltonetworks.com/cloud-lateral-movement-techniques
https://sysdig.com/blog/lateral-movement-cloud-containers
https://blogs.microsoft.com/on-the-issues/2021/03/02/new-nation-state-cyberattacks
https://www.aquasec.com/cloud-native-academy/cloud-attacks/lateral-movement
Cloud Security Tools and Technologies :
Why is Cloud Security Important? Key Benefits & Risks
What Is Cloud Security? | CrowdStrike
What Are the 5 Cloud Deployment Models [Explained & Compared]
The Shared Responsibility Model for Cloud Security | CSA
https://www.pluralsight.com/resources/blog/cloud/5-pillars-cloud-security
What is identity and access management (IAM)? – Microsoft Entra | Microsoft Learn
What is Identity and Access Management (IAM)? | IBM
Encryption and key management overview – Microsoft Service Assurance | Microsoft Learn
What is SIEM? How does it work? | Fortinet
What Is SIEM? | Microsoft Security
What is Identity Access Management (IAM)? | Microsoft Security
What is Identity and Access Management (IAM)? | IBM
What is Threat Intelligence? | IBM
What is Endpoint Security? How Does It Work? | Fortinet
Cloud Migration Challenges and How to Overcome Them
Top Cloud Security Issues: Threats, Risks, Challenges & Solutions
https://www.wiz.io/academy/cloud-security-challenges
12 Cloud Security Issues: Risks, Threats & Challenges | CrowdStrike
More details about the October 4 outage – Engineering at Meta
Understanding how Facebook disappeared from the Internet
Azure Misconfiguration Exposes 250 Million Microsoft Customer Accounts — Redmond Channel Partner
Lessons from Microsoft’s Azure Misconfiguration
2019 Capital One Cyber Incident | What Happened | Capital One
https://krebsonsecurity.com/2019/07/capital-one-data-theft-impacts-106m-people
DDOS Attack in Detail references :
[1] research gate- Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions : https://www.researchgate.net/publication/363114413_Distributed_Denial-of-Service_DDoS_Attacks_and_Defense_Mechanisms_in_Various_Web-Enabled_Computing_Platforms_Issues_Challenges_and_Future_Research_Directions
[4] N. Agrawal and S. Tapaswi, “Defense mechanisms against DDoS attacks in a cloud computing environment: State-of-the-art and research challenges,”https://ieeexplore.ieee.org/document/8794618 , 2019.
[5] N. Agrawal and S. Tapaswi, A Lightweight Approach to Detect the Low/High Rate IP Spoofed Cloud DDoS Attacks https://ieeexplore.ieee.org/abstract/document/8315365
[6] Joshi, B., Vijayan, A. S., & Joshi, B. K. (2012, January). Securing cloud computing environment against DDoS attacks.
https://ieeexplore.ieee.org/document/6158817
[7] Mitigating DDoS Attacks in Cloud Computing Environments: Challenges and Strategies https://www.researchgate.net/publication/377599351_Mitigating_DDoS_Attacks_in_Cloud_Computing_Environments_Challenges_and_Strategies
[19] R. K. Deka, D. K. Bhattacharyya, and J. K. Kalita, “Ddos attacks: Tools, mitigation approaches, and probable impact on private cloud environment,” Big Data Analytics for Internet of Things, pp. 285- 319, 2021.
[20] B. B. Gupta and A. Dahiya, Distributed Denial of
Service (DDoS) Attacks: Classification, Attacks,Challenges and Countermeasures: CRC press, 2021.
[22] A. Odeh, “Taxonomy of Cluster-Based Target
Tracking System in Wireless Sensor Networks,”International Journal of Sensors Wireless Communications and Control, vol. 10, pp.
649- 658, 2020.
[9] ResearchGate – A Survey on Mitigation Techniques Against DDoS Attacks on Cloud Computing Architecture
[2] https://www.sciencedirect.com/science/article/pii/S2665917423003276
Scope :
Our work is focused on the importance of security in cloud networks (i.e., gigantic clouds of interconnected servers, storage, and applications) accessible from anywhere in the world. This openness is not only beneficial for cost-efficiency and scalability but also opens up cloud infrastructure to sophisticated cyber-attacks. Our project takes these risks to the extreme by exploring individual threats and practical tips for mitigation, to help you better comprehend and improve cloud network security.
With the rise of the cloud across the globe, it’s important to understand that the environments are particularly prone to security threats since they are collective and connected. The collective infrastructure means a single breach can impact multiple users and organizations and disrupt millions of services. This knowledge about risks isn’t limited to cybersecurity professionals, it’s important for any business or individual who uses the cloud.
Our teaching aid is an interactive video, which takes you through the most common threats in the cloud: packet sniffing, DDoS attacks, firewall misconfigurations, and the misuse of unsecured protocols. Each chapter defines the attack methods and how they can result in data loss, service interruptions, and other negative effects. We also use real-world examples in our video like the Capital One data breach and Facebook outage to put these issues into perspective.
Furthermore, we will learn about some of the important cloud security tools like Identity and Access Management (IAM), Data Encryption and Key Management, Security Information and Event Management (SIEM) and Cloud Access Security Brokers (CASB) . All of these, when combined well, provide a solid defense framework to monitor and secure your network in real-time, protect your data, and manage access.
The key learning points include:
– Cloud-specific Threat Identification: You’ll see how cloud attackers ply their trade by sniffing packets and moving along laterally, and why they are particularly effective in the cloud.
– Security Prevention and Responses: For each threat, we provide practical responses such as encryption, multi-factor authentication, and network segmentation to secure cloud resources.
– Real-World Case Studies: Through the case studies of real-world attacks, you’ll be able to get a realistic feel for what happens and what is at stake when cloud security breaches happen, and what preventive actions can be taken to stop them.
– Cloud Security Tools and Technologies: In addition to threat mitigation, you will also see useful tools to enhance cloud security. We talk about Identity and Access Management (IAM) for access control, Data Encryption and Key Management for data protection, Security Information and Event Management (SIEM) for real-time threat detection, and Cloud Access Security Brokers (CASB) for policy enforcement. These services integrate to provide a secure cloud by enabling access, data security, and threat detection.
By the end of the video, you’ll have a better appreciation of cloud network security vulnerabilities and a good basis for security best practices to avoid these attacks. If you’re a cybersecurity fan, a cloud user, or an IT professional, this is important information to know in order to protect data and ensure that cloud environments are secure in an ever-digital world.
Bridging the Gap Between Academic Research and Student Learning
By implementing a teaching aid in this medium, we aim to bridge the gap between complex academic research papers with vast amounts of valuable information in a step-by-step breakdown to help students learn better. Additionally, many scholarly papers hold a large volume of technical jargon that can overwhelm new readers who may not already have a foundation for these topics. Our aid crafts together technical high-level concepts using an approachable method. The animation allows us to transform detailed research into a learning experience that is more dynamic and will enable students to retain information without too much strain.
Conclusion
Through this teaching aid, you’ll learn the most fundamentals of cloud network security, which is more important than ever as businesses around the world adopt the cloud. With the insight into the unique threats posed by cloud infrastructures – and how to mitigate them – you can do more to safeguard data, reduce risks, and improve cloud security in general. In this video, you will be able to see cloud security isn’t about technology alone, it’s about practices, constant monitoring, and defense against cyber threats as they emerge. All this information is valuable for anyone who uses or uses cloud services because it can be used to build safer, more robust digital systems.
What is Network in the Cloud? | Glossary | HPE EUROPE
Why is Cloud Security Important? Key Benefits & Risks
(PDF) Distributed Denial-of-Service (DDoS) Attacks and Defense Mechanisms in Various Web-Enabled Computing Platforms: Issues, Challenges, and Future Research Directions
Discussion Questions :
1. What are some ways that you can avoid being targeted by packet sniffers on a cloud?
2. How does the concept of “least privilege” prevent lateral movement in a cloud network?
3. As demonstrated in Microsoft Azure’s data exposure case, how do frequent auditing efforts help to avoid such incidents?
4. What are some preventions against DDoS attacks in the cloud and why should they be taken?