The success of any intricate computing project hinges on the pivotal role played by its system design. This research focuses on the critical task of malicious traffic detection in a cloud environment, emphasizing the significance of an effective system design as the cornerstone of our solution’s efficacy and resilience. Delving into the intricacies of the system design provides a comprehensive insight into its architecture, components, and strategies. The design model revolves around the meticulous process of detecting and responding to malicious traffic,involving the collection of flow logs from EC2 instance subnets. The system design includes data collection, processing, detection mechanisms, scalability, security measures, data storage, performance optimization, and cost analysis. The processed and analyzed flow logs identify signs of malicious activity, forming the cornerstone of the security strategy. In the event of malicious event detection, the system responds promptly and effectively, ranging from immediate blocking of malicious activities to proactive notification of administrators.
Authors: O. Y. Ogunlola, H. O. Azeez, A. O. Oronti, O. O. Abereowo, O. D. Alowolodu, B. K. Alese
Published in: International Conference on Information Society (i-Society-2024)
- Date of Conference: 26-28 August, 2024
- DOI: 10.20533/iSociety.2024.0023
- ISBN: 978-1-913572-72-3
- Conference Location: Churchill College, Cambridge, UK