2020
DOI: 10.15294/sji.v7i1.18299
|View full text |Cite
|
Sign up to set email alerts
|

Web Forensic on Container Services Using Grr Rapid Response Framework

Abstract: Cybercrime on Internet that keeps increasing does not only take place in the environment that running web applications traditionally under operating system, but also web applications that are running in more advance environment like container service. Docker is a currently popular container service in Linux operating system needs to be secured and implements incident response mechanisme that will investigate web server that was attacked by DDoS in fast, valid, and comprehesive way. This paper discusses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 10 publications
0
8
0
Order By: Relevance
“…References [14]- [17] applied a GRR to several domains to collect data and attempted forensic analysis. Ref.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…References [14]- [17] applied a GRR to several domains to collect data and attempted forensic analysis. Ref.…”
Section: Related Workmentioning
confidence: 99%
“…Refs. [15]- [17] highlighted the need for digital forensics for web servers operating in containers (e.g., Docker and Kubernetes) and used some to respond to distributed denial-ofservice attacks. In these studies, the method of recognizing a DDoS attack by checking the web server log and IP address was used.…”
Section: Related Workmentioning
confidence: 99%
“…The forensic analysis then carried out using forensic methodology from NIST, which has four stages, namely: Preservation, Acquisition, Examination & Analysis, and Reporting. Preservation conducted by made a logical backup of evidence followed with Acquisition where WA artefact s will be identified and extracted from logical backup files [25]. Examination & analysis then carried out to find proof followed by Reporting.…”
Section: Fig 3 Forensic Analysis Stagesmentioning
confidence: 99%
“…The information system is an application used in an organization that supports transaction management and makes reporting easier [1,2]. An information system improves usability, maintainability, and security through standardization and development of best practices [3,4]. Authentication is the main gateway in an information system to get authorization to access the account [5].…”
Section: Introductionmentioning
confidence: 99%
“…Information security is an important aspect that needs to be considered in building a system [10]. As the main gate of the system, has gaps and vulnerabilities, including sending and receiving the payload from the server as plain text, because it should be encrypted in sending the payload to maintain the payload's anonymity [11,12,13].…”
Section: Introductionmentioning
confidence: 99%