2016
DOI: 10.1016/j.cose.2016.03.001
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive evidence collection in the cloud using attack scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 27 publications
(19 citation statements)
references
References 19 publications
(27 reference statements)
0
19
0
Order By: Relevance
“…However, in large scale environments like cloud systems, monitoring all potential evidence is not a viable solution, as it might be cumbersome to analyse. Pasquale et al [37] propose a more targeted approach, where evidence preservation activities aim to detect potential attack scenarios that can violate existing security policies. However, this approach is less selective as it prescribe to preserve any type of event within a history leading to an incident, independently of other events that have previously occurred or preserved.…”
Section: Related Workmentioning
confidence: 99%
“…However, in large scale environments like cloud systems, monitoring all potential evidence is not a viable solution, as it might be cumbersome to analyse. Pasquale et al [37] propose a more targeted approach, where evidence preservation activities aim to detect potential attack scenarios that can violate existing security policies. However, this approach is less selective as it prescribe to preserve any type of event within a history leading to an incident, independently of other events that have previously occurred or preserved.…”
Section: Related Workmentioning
confidence: 99%
“…Pasquale et al [19] propose an evidence collection approach aimed to adaptively identify relevant evidence that should be collected proactively by IaaS (Infrastructure as a Service) cloud service providers. This evidence is identified from potential attack scenarios that may exploit well known vulnerabilities, such as those documented in the Common Vulnerabilities Exposures CVE dictionary.…”
Section: Forensic Readiness Requirementsmentioning
confidence: 99%
“…Moreover, the former approach is not preserved in cases where the CSP itself is dishonest or the logger in the cloud is malicious. Most of the mechanisms use chaining methods of encryption to preserve the logs that an external attacker cannot access or modify the log traces …”
Section: Introductionmentioning
confidence: 99%
“…Most of the mechanisms use chaining methods of encryption to preserve the logs that an external attacker cannot access or modify the log traces. [8][9][10] In order to deal with such challenges, secure logging scheme is proposed to store the logs in a secure manner. Since the data remaining in VMs are volatile in nature, the proposed scheme collects the logs in central physical storage to resolve the volatility issues of logs.…”
mentioning
confidence: 99%