2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics 2015
DOI: 10.1109/saci.2015.7208257
|View full text |Cite
|
Sign up to set email alerts
|

Cloud computing digital forensics framework for automated anomalies detection

Abstract: Cloud Computing is one of the most important paradigms used in today's digital environment because they offer to the user benefits such as virtual machine renting, digital information backup, ease of access to stored data and many other. Together with the increased usage of these technologies, at the datacenter level we need to know in detail the information flux between the computing nodes. More exactly, on which server the data is processed, how it is manipulated and stored at the physical or virtual level. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 7 publications
0
2
0
Order By: Relevance
“…To separate the relevance evidence in the information layer, voting-k-means approach is used. Deep learning techniques will be applied in future research in the cloud computing environment for digital forensics to enhance clustering [19], [20].…”
Section: Cloudmentioning
confidence: 99%
“…To separate the relevance evidence in the information layer, voting-k-means approach is used. Deep learning techniques will be applied in future research in the cloud computing environment for digital forensics to enhance clustering [19], [20].…”
Section: Cloudmentioning
confidence: 99%
“…A number of research projects are in progress with the aim to overcome cloud forensic challenges. A framework has been presented for the automated detection of anomalies in a cloud environment . Architecture‐level changes are performed, and a module for cloud forensics, which is capable of learning malicious activities, is embedded in the management layer of the cloud infrastructure.…”
Section: Related Workmentioning
confidence: 99%