Academic Journals Database
Disseminating quality controlled scientific knowledge

Regenerating Cloud Attack Scenarios using LVM2 based System Snapshots for Forensic Analysis

Author(s): G. Geethakumari | Abha Belorkar

Journal: International Journal of Cloud Computing and Services Science (IJ-CLOSER)
ISSN 2089-3337

Volume: 1;
Issue: 3;
Start page: 134;
Date: 2012;
Original page

Even though Cloud Computing has proved its utility and efficacy in many areas, security threats are a major obstacle in its widespread application. Cloud Forensics, with its existing equipment, has played an important role in improving our understanding of these threats, thereby contributing to the development of better and more robust cloud computing systems.In our earlier work, we introduced the use of fuzzy clustering techniques to detect and record malicious activities in cloudfor building strong and reliable evidences of the attacks. We now discuss the method in detail with certain essential aspects of its implementation. We also suggest ways to improve the time-complexity of the relevant back-end calculations.
Save time & money - Smart Internet Solutions      Why do you need a reservation system?