A Novel HIDS and Log Collection Based System for Digital Forensics in Cloud Environment

被引:0
作者
Shaikh, Arsalan Ali [1 ]
Qi, Heng [1 ]
Jiang, Wei [2 ]
Tahir, Muhammad [3 ]
机构
[1] Dalian Univ Technol, Sch Comp Sci & Technol, Dalian, Peoples R China
[2] Dalian Normal Univ, Sch Math, Dalian, Peoples R China
[3] Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China
来源
PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC) | 2017年
关键词
cloud computing; cloud security; digital forensics; HIDS;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Nowadays, cloud computing has become an emerging and widely used technology throughout the world on account of its dynamic, reliable and customizable quality of service. However, at the same time, the security problem of cloud environment is attracted more and more attentions from academia and industry. In many concerns regarding cloud computing security, the digital forensic is a hot topic. Compared with traditional digital forensic on common digital devices and hardware, it is difficult to implement digital forensic in cloud because it is very hard to collect logs from cloud environment. In this paper, we try to design a new system to address the issue of digital forensic in cloud environment. We use a new architecture to help investigators performing the log collection. Firstly, a Host-based Intrusion Detection System (HIDS) is introduced to secure the data in cloud from malicious attacks of intruders. Then, based on the feedback results of HIDS, one web server generates email alerts and Secure Shell (SSH) message to restrict further suspicious activities. Finally, the digital forensic investigators can collect reliable evidence of suspected user. In this way, HIDS and log collection will be significant part for digital forensic in cloud environment.
引用
收藏
页码:1434 / 1438
页数:5
相关论文
共 13 条
[1]  
Almulla S, 2016, 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), P724, DOI 10.1109/INTECH.2016.7845140
[2]  
Anand P, 2015, PROCEEDINGS 2015 FIRST INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2015), P13, DOI 10.1109/ICSSA.2015.013
[3]  
[Anonymous], 2013, 5 INT C PERV PATT AP
[4]  
[Anonymous], SEC CLOUD
[5]  
[Anonymous], ZEUS BOTN CONTR
[6]  
Birk D., 2011, IEEE INTL CONF IND I, P1, DOI DOI 10.1109/SADFE.2011.17
[7]   Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques [J].
Dykstra, Josiah ;
Sherman, Alan T. .
DIGITAL INVESTIGATION, 2012, 9 :S90-S98
[8]  
MARTY R., 2011, P ACM S APPL COMPUTI, P178, DOI DOI 10.1145/1982185.1982226
[9]  
Ruan K., 2011, P 7 IFIP INT C DIG F, P16
[10]   Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment [J].
Xiao, Zhen ;
Song, Weijia ;
Chen, Qi .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2013, 24 (06) :1107-1117