2011 Frontiers of Information Technology 2011
DOI: 10.1109/fit.2011.28
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensics for Eucalyptus

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
30
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 43 publications
(30 citation statements)
references
References 6 publications
0
30
0
Order By: Relevance
“…Zafarullah et al were able to monitor the activity of a Eucalyptus-based cloud and log all internal and external interaction of Eucalyptus components (Zafarullah, 2011). From logs, the were able to track a DDoS attack launched from their Eucalyptus cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Zafarullah et al were able to monitor the activity of a Eucalyptus-based cloud and log all internal and external interaction of Eucalyptus components (Zafarullah, 2011). From logs, the were able to track a DDoS attack launched from their Eucalyptus cloud.…”
Section: Related Workmentioning
confidence: 99%
“…Zafarullah et al [51] propose a centralized approach to analyze log files in an IaaS environment, in which the cloud provider is responsible for forensic investigations. Martini and Choo describe an integrated conceptual digital forensic framework for cloud computing [29].…”
Section: Related Workmentioning
confidence: 99%
“…Based on experiments conducted using objects {A,B} and {A,C}, {D,E}, {F,G}, {F,H} the solution converges to different figures when [1,2], [2,3], [2,4], [2,5], [2,6] root interval are used. Table 3 shows the convergence and functional values of the experiments …”
Section: Data Sets For Conducted Experimentsmentioning
confidence: 99%
“…The testing experiments have generated five different scenarios for the objects {A,B} and {A,C}, {D,E}, {F,G}, {F,H} and the test values [1,2], [2,3], [2,4], [2,5] and [2,6] respectively. The authors chose to carry out these separate tests for two main reasons: To find the convergence of the roots that are treated as data objects that move within the cloud and to find the functional object that will help to show how closeness the objects can be during data provenance.…”
Section: Concept Evaluationmentioning
confidence: 99%
See 1 more Smart Citation