Proposed computer forensic approach for cloud computing environment

Mubarak Ahmed, Ganthan Narayana Samy, Nurazean Maarop, Bharanidharan Shanmugam, Pritheega Magalingam, Rabiah Ahmad

    Research output: Contribution to journalArticleResearchpeer-review

    9 Downloads (Pure)

    Abstract

    The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach.

    Original languageEnglish
    Pages (from-to)3137-3141
    Number of pages5
    JournalAdvanced Science Letters
    Volume22
    Issue number10
    DOIs
    Publication statusPublished - 1 Oct 2016

    Fingerprint

    Computer forensics
    Cloud computing
    Cloud Computing
    Attack
    infrastructure
    Infrastructure
    incident
    Information Storage and Retrieval
    Information Systems
    Virtual reality
    Information systems
    Research Personnel
    Virtual Machine
    Perimeter
    information system
    Virtual Environments
    threat
    Refinement
    Classify
    Computing

    Cite this

    Ahmed, Mubarak ; Samy, Ganthan Narayana ; Maarop, Nurazean ; Shanmugam, Bharanidharan ; Magalingam, Pritheega ; Ahmad, Rabiah. / Proposed computer forensic approach for cloud computing environment. In: Advanced Science Letters. 2016 ; Vol. 22, No. 10. pp. 3137-3141.
    @article{532ac7750fcd49349c373edc153d9226,
    title = "Proposed computer forensic approach for cloud computing environment",
    abstract = "The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach.",
    keywords = "Cloud computing, Computer forensic, Information security, Network, Software as a service (IaaS)",
    author = "Mubarak Ahmed and Samy, {Ganthan Narayana} and Nurazean Maarop and Bharanidharan Shanmugam and Pritheega Magalingam and Rabiah Ahmad",
    year = "2016",
    month = "10",
    day = "1",
    doi = "10.1166/asl.2016.8011",
    language = "English",
    volume = "22",
    pages = "3137--3141",
    journal = "Advanced Science Letters",
    issn = "1936-6612",
    publisher = "American Scientific Publishers",
    number = "10",

    }

    Ahmed, M, Samy, GN, Maarop, N, Shanmugam, B, Magalingam, P & Ahmad, R 2016, 'Proposed computer forensic approach for cloud computing environment', Advanced Science Letters, vol. 22, no. 10, pp. 3137-3141. https://doi.org/10.1166/asl.2016.8011

    Proposed computer forensic approach for cloud computing environment. / Ahmed, Mubarak; Samy, Ganthan Narayana; Maarop, Nurazean; Shanmugam, Bharanidharan; Magalingam, Pritheega; Ahmad, Rabiah.

    In: Advanced Science Letters, Vol. 22, No. 10, 01.10.2016, p. 3137-3141.

    Research output: Contribution to journalArticleResearchpeer-review

    TY - JOUR

    T1 - Proposed computer forensic approach for cloud computing environment

    AU - Ahmed, Mubarak

    AU - Samy, Ganthan Narayana

    AU - Maarop, Nurazean

    AU - Shanmugam, Bharanidharan

    AU - Magalingam, Pritheega

    AU - Ahmad, Rabiah

    PY - 2016/10/1

    Y1 - 2016/10/1

    N2 - The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach.

    AB - The security perimeter in computing has changed from a fixed boundary to an elastic boundary that is constantly changing and also the threats are evolving, making the Incident handler more difficult to analyze the information system based attacks. Therefore, the purposes of this study are introducing a new approach in identifying computer forensic attacks using Infrastructure as a Service (IaaS) in a cloud computing environment. First will identify and classify the different types of attacks on cloud infrastructure. Next, based on the attacks we are going to suggest an appropriate approach that can be utilized to collect as much data possible to perform a detailed investing of the incidents or attacks. Furthermore, the proposed approach will be tested in a virtual environment in order to check its effectiveness. Finally, refinement will be performed based on the results obtained and will be bench marked against the existing computer forensic approaches. Thus, this study contributes to better provide many data sources that can be used by the investigators to conduct forensics investigation in the infrastructure layer of the cloud computing. The findings will benefit the organizations which deploy private cloud services and infrastructure services which include virtual machines. Therefore, this paper discusses in detail the proposed computer forensic approach.

    KW - Cloud computing

    KW - Computer forensic

    KW - Information security

    KW - Network

    KW - Software as a service (IaaS)

    UR - http://www.scopus.com/inward/record.url?scp=85009110696&partnerID=8YFLogxK

    U2 - 10.1166/asl.2016.8011

    DO - 10.1166/asl.2016.8011

    M3 - Article

    VL - 22

    SP - 3137

    EP - 3141

    JO - Advanced Science Letters

    JF - Advanced Science Letters

    SN - 1936-6612

    IS - 10

    ER -