Proposed computer forensic approach for cloud computing environment

The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducin...

Full description

Bibliographic Details
Main Authors: Ahmed, M., Samy, G. N., Maarop, N., Shanmugam, B., Magalingam, P., Ahmad, R.
Format: Article
Published: American Scientific Publishers 2016
Subjects:
_version_ 1796861824330629120
author Ahmed, M.
Samy, G. N.
Maarop, N.
Shanmugam, B.
Magalingam, P.
Ahmad, R.
author_facet Ahmed, M.
Samy, G. N.
Maarop, N.
Shanmugam, B.
Magalingam, P.
Ahmad, R.
author_sort Ahmed, M.
collection ePrints
description The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach.
first_indexed 2024-03-05T20:02:16Z
format Article
id utm.eprints-71771
institution Universiti Teknologi Malaysia - ePrints
last_indexed 2024-03-05T20:02:16Z
publishDate 2016
publisher American Scientific Publishers
record_format dspace
spelling utm.eprints-717712017-11-15T01:47:39Z http://eprints.utm.my/71771/ Proposed computer forensic approach for cloud computing environment Ahmed, M. Samy, G. N. Maarop, N. Shanmugam, B. Magalingam, P. Ahmad, R. QA76 Computer software The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach. American Scientific Publishers 2016 Article PeerReviewed Ahmed, M. and Samy, G. N. and Maarop, N. and Shanmugam, B. and Magalingam, P. and Ahmad, R. (2016) Proposed computer forensic approach for cloud computing environment. Advanced Science Letters, 22 (10). pp. 3137-3141. ISSN 1936-6612 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85009110696&doi=10.1166%2fasl.2016.8011&partnerID=40&md5=14f748e801c47001270d33e86602a791
spellingShingle QA76 Computer software
Ahmed, M.
Samy, G. N.
Maarop, N.
Shanmugam, B.
Magalingam, P.
Ahmad, R.
Proposed computer forensic approach for cloud computing environment
title Proposed computer forensic approach for cloud computing environment
title_full Proposed computer forensic approach for cloud computing environment
title_fullStr Proposed computer forensic approach for cloud computing environment
title_full_unstemmed Proposed computer forensic approach for cloud computing environment
title_short Proposed computer forensic approach for cloud computing environment
title_sort proposed computer forensic approach for cloud computing environment
topic QA76 Computer software
work_keys_str_mv AT ahmedm proposedcomputerforensicapproachforcloudcomputingenvironment
AT samygn proposedcomputerforensicapproachforcloudcomputingenvironment
AT maaropn proposedcomputerforensicapproachforcloudcomputingenvironment
AT shanmugamb proposedcomputerforensicapproachforcloudcomputingenvironment
AT magalingamp proposedcomputerforensicapproachforcloudcomputingenvironment
AT ahmadr proposedcomputerforensicapproachforcloudcomputingenvironment