Nguyễn Trần Đức An

@ducansuper

cloud, architect, network and smthing fun

Joined on Jun 7, 2023

  • IDS stands for Intrusion Detection System. It is a security technology used to monitor network traffic or system activities for signs of unauthorized access, malicious activities, or security policy violations. The primary goal of an IDS is to detect potential security breaches and raise alerts to administrators or security personnel, enabling them to take appropriate action and prevent potential threats from escalating. In a cloud environment, the need for an Intrusion Detection System (IDS) remains significant, and in some ways, it becomes even more critical due to the unique security challenges presented by cloud computing. Here are some of the reasons why IDS is needed in a cloud environment: Increased Attack Surface: Cloud environments typically have a larger attack surface compared to traditional on-premises setups. Multiple virtual machines, containers, and services may be running on shared infrastructure. This complexity can lead to more potential entry points for attackers, making continuous monitoring and threat detection essential. Dynamic and Elastic Nature: Cloud environments are highly dynamic and elastic, with resources being provisioned and de-provisioned on demand. The rapid scaling and changing network configurations can make it challenging to maintain visibility and control over the entire infrastructure. An IDS helps track these changes and detects potential security issues in real time. Shared Responsibility Model: In most cloud service models (e.g., Infrastructure as a Service - IaaS, Platform as a Service - PaaS), there is a shared responsibility model between the cloud service provider (CSP) and the customer. While the CSP is responsible for the security of the cloud infrastructure, the customer is responsible for securing their data, applications, and access controls. An IDS on the customer's side enhances their ability to monitor and protect their assets. Zero Trust Architecture: Cloud environments often follow a zero trust architecture, where trust is not automatically granted to any user or device, even if they are within the corporate network. An IDS helps validate and enforce security policies, ensuring that suspicious activities are identified and acted upon promptly. Visibility into Encrypted Traffic: With the widespread use of Transport Layer Security (TLS) encryption, malicious activities can be concealed within encrypted traffic. Advanced IDS solutions can perform SSL/TLS decryption to analyze the contents of encrypted packets and identify potential threats. Compliance and Regulatory Requirements: Many industries have strict compliance and regulatory requirements for data security. Implementing an IDS in the cloud environment helps meet these obligations by providing continuous monitoring and threat detection capabilities.
     Like  Bookmark
  • Introduction When I made my project with Datasunrise, there was no one before to guide me but only documents from the company, and of course the setup guide was quite sketchy, so it was quite difficult to install as proxy. So I write this blog to make it easier for newbies to set up Datasunrise as proxy. Overview Datasunrise, a company specializing in database security and management. These solutions are designed to address various aspects of database security, data protection, and compliance. Datasunrise solutions typically include features such as:
     Like  Bookmark
  • Original SteganoGAN License: MIT Documentation: (https://DAI-Lab.github.io/SteganoGAN) 2023's SteganoGAN https://github.com/ngtranducan/Forensics_SteganoGAN Overview This SteganoGAN is fixed for new update of torch, python, torchvision instead of the old version from author.
     Like  Bookmark
  • Nói nhảm Chuyện là sau khi tiếp xúc nhiều mảng trong ngành thì mình nhận ra có lẽ mình hợp với kiểu analyst rồi đưa ra solution hay đưa ra problem mà mô hình đó đang gặp phải hơn là đi exploit. Tiếp theo là kỳ này mình học Network Security Advanced mình nhận ra mình khá thích về Network Architecture nên mình quyết định theo hướng này luôn. Không biết tương lai sẽ ra sao nhưng cái đó là tương lai =))) Note này là note để học AWS keke Module 1: intr to aws 3 model of cloud computing deployments
     Like  Bookmark