Automation of Forensic Analysis for AWS Aurora using EventBridge and Athena

Vuyyuru Sai Venkata Murali Krishna, Tammana Sai Rama Vamsi, S. Kavitha
{"title":"Automation of Forensic Analysis for AWS Aurora using EventBridge and Athena","authors":"Vuyyuru Sai Venkata Murali Krishna, Tammana Sai Rama Vamsi, S. Kavitha","doi":"10.1109/ICECA55336.2022.10009126","DOIUrl":null,"url":null,"abstract":"The advancement of cyber technology has a tremendous boost over the years which results in a threat to security as one outcome. So, the domain of forensics plays a crucial role in detecting and preventing various cyber threats. As a motto of minimizing hardware storage and computation, industries are moving towards the cloud platform which provides maximum services such as storage, computation, etc. at low cost and also based on the requirement. Therefore, this ideology has attracted several organizations and individuals in moving toward cloud platforms. Hence as an instinct, the threat of the CIA triad has also arrived on the cloud. In every software application, the database plays a major role, as a result, it has become a resource for attackers to gain information which resulted in various attacks on the database. Therefore, database monitoring has become an important role. To monitor or investigate the attack the logs of the database are used. Hence storing the logs is also a challenge since the logs shouldn't lose their integrity. This research work proposes a novel architecture with maximum throughput and a strong storing mechanism to automatically store the logs following a user-defined timeline analysis by using Athena, Lambda, and EventBridge along with strong security features such as encryption, versioning, etc. that guide the monitoring process and forensic analysis.","PeriodicalId":356949,"journal":{"name":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 6th International Conference on Electronics, Communication and Aerospace Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICECA55336.2022.10009126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The advancement of cyber technology has a tremendous boost over the years which results in a threat to security as one outcome. So, the domain of forensics plays a crucial role in detecting and preventing various cyber threats. As a motto of minimizing hardware storage and computation, industries are moving towards the cloud platform which provides maximum services such as storage, computation, etc. at low cost and also based on the requirement. Therefore, this ideology has attracted several organizations and individuals in moving toward cloud platforms. Hence as an instinct, the threat of the CIA triad has also arrived on the cloud. In every software application, the database plays a major role, as a result, it has become a resource for attackers to gain information which resulted in various attacks on the database. Therefore, database monitoring has become an important role. To monitor or investigate the attack the logs of the database are used. Hence storing the logs is also a challenge since the logs shouldn't lose their integrity. This research work proposes a novel architecture with maximum throughput and a strong storing mechanism to automatically store the logs following a user-defined timeline analysis by using Athena, Lambda, and EventBridge along with strong security features such as encryption, versioning, etc. that guide the monitoring process and forensic analysis.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
使用EventBridge和Athena实现AWS Aurora的取证分析自动化
多年来,网络技术的进步得到了巨大的推动,其结果之一是对安全构成了威胁。因此,取证领域在检测和预防各种网络威胁方面发挥着至关重要的作用。作为最小化硬件存储和计算的座右铭,行业正在向云平台移动,云平台以低成本和基于需求提供最大的存储、计算等服务。因此,这种思想吸引了许多组织和个人转向云平台。因此,作为一种本能,中情局三合会的威胁也来到了云端。在每一个软件应用中,数据库都扮演着重要的角色,它也成为攻击者获取信息的资源,导致了对数据库的各种攻击。因此,数据库监控已成为一个重要的角色。为了监视或调查攻击,需要使用数据库的日志。因此,存储日志也是一个挑战,因为日志不应该失去其完整性。本研究工作提出了一个具有最大吞吐量和强大存储机制的新架构,通过使用Athena, Lambda和EventBridge自动存储用户自定义时间线分析后的日志,以及强大的安全特性,如加密,版本控制等,指导监控过程和取证分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Multi-Objective Artificial Flora Algorithm Based Optimal Handover Scheme for LTE-Advanced Networks Named Entity Recognition using CRF with Active Learning Algorithm in English Texts FPGA Implementation of Lattice-Wave Half-Order Digital Integrator using Radix-$2^{r}$ Digit Recoding Green Cloud Computing- Next Step Towards Eco-friendly Work Stations Diabetes Prediction using Support Vector Machine, Naive Bayes and Random Forest Machine Learning Models
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1