LAP SURAKSHA

Authors

  • D. SHINE RAJESH Author
  • B.Amurutha valli Author
  • B.Udayasri Author
  • O.Harshitha reddy Author

DOI:

https://doi.org/10.64751/ijdim.2025.v4.n4.pp465-470

Keywords:

Threat Detection, Security Alerts, Security Orchestration, Automation, and Response (SOAR), Incident response

Abstract

Lap Suraksha is a holistic approach to cybersecurity that quickly identifies and defends against current and emergent security threats in two phases: detect and protect. The cybersecurity system relies on containerized microservices, limiting the devastation of an attack or bug by developing isolatable environments with Docker, ensuring that each module like log collection, event correlation, anomaly detection, and visualization is readily scalable and reproducible in case of a failure. Lap Suraksha’s root is AI that works on the back of SIEM. The system differs from other cybersecurity programs, relying on both explicit and implicit attacks reliant on attack patterns. The system’s hyperspace system records incoming logs, system logs, and network events. These drivers are stored logging information on the persistence stack for further analysis. Hsic_hyper 690 stores data from different drivers in different services.

Downloads

Published

2025-12-15

How to Cite

D. SHINE RAJESH, B.Amurutha valli, B.Udayasri, & O.Harshitha reddy. (2025). LAP SURAKSHA. International Journal of Data Science and IoT Management System, 4(4), 465–470. https://doi.org/10.64751/ijdim.2025.v4.n4.pp465-470

Similar Articles

1-10 of 359

You may also start an advanced similarity search for this article.