Semantic-Assisted Security for the Emerging Cloud Native Environments

Guardado en:
Detalles Bibliográficos
Publicado en:ProQuest Dissertations and Theses (2025)
Autor principal: Kavousi, Mohammad
Publicado:
ProQuest Dissertations & Theses
Materias:
Acceso en línea:Citation/Abstract
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3180771007
003 UK-CbPIL
020 |a 9798310149472 
035 |a 3180771007 
045 2 |b d20250101  |b d20251231 
084 |a 66569  |2 nlm 
100 1 |a Kavousi, Mohammad 
245 1 |a Semantic-Assisted Security for the Emerging Cloud Native Environments 
260 |b ProQuest Dissertations & Theses  |c 2025 
513 |a Dissertation/Thesis 
520 3 |a Research on computer malware began in the 1970s, with a significant focus on developing countermeasures over the decades. Extensive studies and tools now cover every stage of an attack lifecycle, from reconnaissance to installation, privilege escalation, data recovery, and even post-attack cleanup. As cloud systems have risen in prominence, particularly since Amazon Web Services (AWS) launched in 2006, their security demands have grown. Ensuring secure cloud environments now involves a comprehensive framework including prevention and configuration, data collection, detection, forensics, and remediation. Each of these form a structured approach within an organization’s cybersecurity strategy. This dissertation primarily explores the role of semantic information in the stages of configuration and forensics, with further insights into data collection and detection. It introduces two projects: the first project develops a tool that extracts semantic information from low-level system events, enhancing security analysts’ understanding of seemingly less-informative data collected from end-user machines in large-scale organizations. The second project leverages semantic information to automate secure configurations in cloud-native environments. Both projects target large-scale systems, concentrating on the usage of semantics in different stages of security implementations. 
653 |a Computer science 
653 |a Computer engineering 
653 |a Information technology 
773 0 |t ProQuest Dissertations and Theses  |g (2025) 
786 0 |d ProQuest  |t ProQuest Dissertations & Theses Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3180771007/abstract/embedded/L8HZQI7Z43R0LA5T?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3180771007/fulltextPDF/embedded/L8HZQI7Z43R0LA5T?source=fedsrch