Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis
Even though Cloud Computing has proved its utility and efficacy in many areas, security threats are a major obstacle in its widespread application. Cloud Forensics, with its existing equipment, has played an important role in improving our understanding of these threats, thereby contributing to the...
Gespeichert in:
Veröffentlicht in: | International journal of cloud computing and services science 2012-07, Vol.1 (3), p.134-141 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Even though Cloud Computing has proved its utility and efficacy in many areas, security threats are a major obstacle in its widespread application. Cloud Forensics, with its existing equipment, has played an important role in improving our understanding of these threats, thereby contributing to the development of better and more robust cloud computing systems.In our earlier work, we introduced the use of fuzzy clustering techniques to detect and record malicious activities in cloudfor building strong and reliable evidences of the attacks. We now discuss the method in detail with certain essential aspects of its implementation. We also suggest ways to improve the time-complexity of the relevant back-end calculations. |
---|---|
ISSN: | 2089-3337 2089-3337 |
DOI: | 10.11591/closer.v1i3.803 |