Identifying evidence for cloud forensic analysis

2Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud computing provides increased flexibility, scalability, failure tolerance and reduced cost to customers. However, like any computing infrastructure, cloud systems are subjected to cyber-attacks. Post-attack investigations of such attacks present unusual challenges including the dependence of forensically valuable data on the deployment model, multiple virtual machines running on a single physical machine and multi-tenancy of clients. In this chapter, we use our own attack samples to show that, in the attacked cloud, evidence from three different sources can be used to reconstruct attack scenarios. They are (1) IDS and application software logging, (2) cloud service API calls and (3) system calls from VMs. Based on our example attack results, we present the potential design and implementation of a forensic analysis framework for clouds, which includes logging all the activities from both the application layer and lower layers. We show how a Prolog based forensic analysis tool can automate the process of correlating evidence from both the clients and the cloud service provider to reconstruct attack scenarios for cloud forensic analysis.

Cite

CITATION STYLE

APA

Liu, C., Singhal, A., & Wijesekera, D. (2017). Identifying evidence for cloud forensic analysis. In Research Advances in Cloud Computing (pp. 371–391). Springer Singapore. https://doi.org/10.1007/978-981-10-5026-8_15

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free