Towards a practical cloud forensics logging framework
This paper exposes and explore the practical issues with the usability of log artefacts for digital forensics in cloud computing. Logs, providing detailed events of actions on a time scale have been a prime forensic artefact. However collection of logs for analysis, from a cloud computing environmen...
| Main Authors: | Pichan, A., Lazarescu, Mihai, Soh, Sie Teng |
|---|---|
| Format: | Journal Article |
| Published: |
2018
|
| Online Access: | http://hdl.handle.net/20.500.11937/72956 |
Similar Items
Cloud forensic: Technical challenges, solutions and comparative analysis
by: Pichan, A., et al.
Published: (2015)
by: Pichan, A., et al.
Published: (2015)
Digital Forensics Investigation Frameworks for Cloud
Computing and Internet of Things
by: Pichan, Ameer
Published: (2022)
by: Pichan, Ameer
Published: (2022)
Addressing the most reliable edge-disjoint paths with a delay constraint
by: Loh, Rue-chze, et al.
Published: (2011)
by: Loh, Rue-chze, et al.
Published: (2011)
Bi-Objective Topology Design of Communication Networks Using Dynamic Programming
by: Elshqeirat, Basima, et al.
Published: (2015)
by: Elshqeirat, Basima, et al.
Published: (2015)
Power-aware routing in networks with quality of services constraints
by: Lin, G., et al.
Published: (2016)
by: Lin, G., et al.
Published: (2016)
Digital forensics framework for investigating client cloud storage applications on smartphones
by: Daryabar, Farid
Published: (2015)
by: Daryabar, Farid
Published: (2015)
Cloud forensics issues and oppurtunities
by: Aminnezhad, Asou, et al.
Published: (2013)
by: Aminnezhad, Asou, et al.
Published: (2013)
Log your car: The non-invasive vehicle forensics
by: Mansor, Hafizah, et al.
Published: (2016)
by: Mansor, Hafizah, et al.
Published: (2016)
A Practical Algorithm for Reliable Network Topology Design
by: Elshqeirat, B., et al.
Published: (2013)
by: Elshqeirat, B., et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A unified tensor framework for face recognition
by: Rana, Santu, et al.
Published: (2009)
by: Rana, Santu, et al.
Published: (2009)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
An analysis method of forensic investigation for platform-as-a-service cloud storage services
by: Shaerpour, Kaveh
Published: (2016)
by: Shaerpour, Kaveh
Published: (2016)
Maximizing bandwidth using disjoint paths
by: Loh, R., et al.
Published: (2010)
by: Loh, R., et al.
Published: (2010)
A Dynamic Programming Algorithm for Reliable Network Design
by: Elshqeirat, Basima, et al.
Published: (2014)
by: Elshqeirat, Basima, et al.
Published: (2014)
Privacy-preserving computer forensics framework
by: Halboob, Waleed Abduljabbar
Published: (2015)
by: Halboob, Waleed Abduljabbar
Published: (2015)
Incremental learning for querying multimodal symbolic data.
by: Lazarescu, Mihai M.
Published: (2000)
by: Lazarescu, Mihai M.
Published: (2000)
A comparison analysis of logging cost between conventional and reduce impact logging practices
by: Abdul Samad, Abdul Rahim, et al.
Published: (2009)
by: Abdul Samad, Abdul Rahim, et al.
Published: (2009)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Greening cloud-enabled big data storage forensics: syncany as a case study
by: Teing, Yee-Yang, et al.
Published: (2019)
by: Teing, Yee-Yang, et al.
Published: (2019)
Edge disjoint paths with minimum delay subject to reliability constraint
by: Loh, Rue-chze, et al.
Published: (2009)
by: Loh, Rue-chze, et al.
Published: (2009)
Dynamic Programming for Minimal Cost Topology with Two Terminal Reliability Constraint
by: Elshqeirat, B., et al.
Published: (2013)
by: Elshqeirat, B., et al.
Published: (2013)
Dynamic Programming for Minimal Cost Topology with Reliability Constraint
by: Elshqeirat, B., et al.
Published: (2013)
by: Elshqeirat, B., et al.
Published: (2013)
Digital forensics investigation framework for Raspberry Pi
by: Manavi, Sina
Published: (2015)
by: Manavi, Sina
Published: (2015)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
The post-conviction polygraph in forensic practice
by: Elliott, Elizabeth
Published: (2017)
by: Elliott, Elizabeth
Published: (2017)
Incremental clustering of dynamic data streams using connectivity based representative points
by: Luhr, Sebastian, et al.
Published: (2009)
by: Luhr, Sebastian, et al.
Published: (2009)
Connectivity based stream clustering using localised density exemplars
by: Luhr, Sebastian, et al.
Published: (2008)
by: Luhr, Sebastian, et al.
Published: (2008)
An Investigation of Power Law Probability Distributions for Network Anomaly Detection
by: Prandl, S., et al.
Published: (2017)
by: Prandl, S., et al.
Published: (2017)
Reliable Green Routing Using Two Disjoint Paths
by: Lin, GongQi, et al.
Published: (2014)
by: Lin, GongQi, et al.
Published: (2014)
A greedy technique for finding the most reliable edge-disjoint-path-set in a network.
by: Loh, Rue-chze, et al.
Published: (2008)
by: Loh, Rue-chze, et al.
Published: (2008)
The Advanced Framework for Evaluating Remote Agents (AFERA):
A Framework for Digital Forensic Practitioners
by: Adams, Richard Brian
Published: (2023)
by: Adams, Richard Brian
Published: (2023)
Cloud computing: cloud adoption in professional practice
by: Nazri, Nadhirah, et al.
Published: (2015)
by: Nazri, Nadhirah, et al.
Published: (2015)
On the effects of energy-aware traffic engineering on routing reliability
by: Lin, Gongqi, et al.
Published: (2013)
by: Lin, Gongqi, et al.
Published: (2013)
Efficient heuristics for energy-aware routing in networks with bundled links
by: Lin, Gongqi, et al.
Published: (2013)
by: Lin, Gongqi, et al.
Published: (2013)
Energy-Aware Two Link-Disjoint Paths Routing
by: Lin, Gongqi, et al.
Published: (2013)
by: Lin, Gongqi, et al.
Published: (2013)
Law and ethics governing forensic nursing practice
by: Jahn Kassim, Puteri Nemie
Published: (2018)
by: Jahn Kassim, Puteri Nemie
Published: (2018)
Similar Items
-
Cloud forensic: Technical challenges, solutions and comparative analysis
by: Pichan, A., et al.
Published: (2015) -
Digital Forensics Investigation Frameworks for Cloud
Computing and Internet of Things
by: Pichan, Ameer
Published: (2022) -
Addressing the most reliable edge-disjoint paths with a delay constraint
by: Loh, Rue-chze, et al.
Published: (2011) -
Bi-Objective Topology Design of Communication Networks Using Dynamic Programming
by: Elshqeirat, Basima, et al.
Published: (2015) -
Power-aware routing in networks with quality of services constraints
by: Lin, G., et al.
Published: (2016)