Securing Communication and Identifying Threats in Cloud Microservices

dc.contributor.authorRavi Kumar, Tejaswini Priyanka
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data och informationstekniksv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineeringen
dc.contributor.examinerTsigas, Philippas
dc.contributor.supervisorButun, Ismail
dc.date.accessioned2023-12-21T05:38:32Z
dc.date.available2023-12-21T05:38:32Z
dc.date.issued2023
dc.date.submitted2023
dc.description.abstractThe automotive industry has grown from making simple passenger vehicles to vehicles which are completely aware of its surroundings. Every car which is being manufactured now promises intelligent functionalities and the cars keep getting smarter every year. As vehicles become part of the IoT cyberspace, similar to smart home assistants, televisions etc., they are exposed to many dangerous threats by default. Hence, an automobile manufacturer’s idea of safety and security needs to evolve from seatbelts and airbags to include the cybersecurity factor. The vehicle should be completely secure in all aspects, which certainly includes its network infrastructure to avoid any attempts to cause mishaps or accidents. Newer technology is being adopted for providing several advantages and one such technology is Microservices Architecture. In simpler words, Microservices are a method of developing software applications which are made up of independently deployable, modular services. Each microservice runs a unique process and communicates through a well-defined, lightweight mechanism such as a container, to serve a business goal. However, one must also keep in mind that microservices are unmonitored, work on zero trust and they have complex communication. The crux of this thesis involves investigating about how to secure these microservices, if a traditional Intrusion Detection System works effectively in the Microservice environment considering the drastic change in architecture. An open source IDS Zeek, which is acting as the traditional security method is used to demonstrate the process for monolithic and microservice based attacks. The corresponding results are thoroughly analyzed and suitable conclusions are drawn.
dc.identifier.coursecodeDATX05
dc.identifier.urihttp://hdl.handle.net/20.500.12380/307466
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectcybersecurity
dc.subjectZeek
dc.subjectIntrusion detection system
dc.subjectMicroservice architecture
dc.subjectMonolithic architecture
dc.titleSecuring Communication and Identifying Threats in Cloud Microservices
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster's Thesisen
dc.type.uppsokH
local.programmeComputer systems and networks (MPCSN), MSc

Ladda ner

Original bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
CSE 23-141 TPR.pdf
Storlek:
4.69 MB
Format:
Adobe Portable Document Format

License bundle

Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
license.txt
Storlek:
2.35 KB
Format:
Item-specific license agreed upon to submission
Beskrivning: