Cloud computing and digital forensics is constantly infiltration, in the professional belongs to the "cloud forensics", refers to from the cloud infrastructure collection of digital forensics data. For a long time, incident response and digital forensics have been the key parts of computer crime investigation, and with the rapid development of cloud computing, incident response and digital forensics have become more and more challenging. For a few examples, local evidence includes information gathered from log files, data stored on disk, network traffic, and intrusion markers. The basic difference between local analytics and cloud service analysis is to use the local computer by simply ...
Research on cloud forensics based on Bayesian Networks Shandong Normal University Liu Dong The main research of this paper is as follows: (1) The paper discusses the basic concepts of electronic forensics, cloud computing and cloud forensics, sums up the electronic forensics technology, the security threats faced by cloud environment and the implementation mechanism of cloud platform, and analyzes the key technologies of cloud forensics. Finally, the basic flow of cloud forensics is given. (2) The paper analyzes the process of evidence mining and evidence processing in cloud forensics, and introduces the basic theory of Bayesian network and MapReduce programming model. A sequence based on MapReduce is proposed.
Ph. D. Research on field migration technology for forensics in cloud computing environment Huazhong University of Zhou First, a new computer forensics model-Cloud computing forensics model under the cloud computing environment is proposed, which defines the working level in the cloud computing environment, and depicts the complete forensics mechanism by describing the scene and dividing the process components. Through the proof of the integrality and strong isolation of the cloud computing model, we can analyze the virtual machine image file as the object of forensics, and then realize the computer forensics process in the cloud computing environment. .
The construction and analysis of Cloud forensics model Gang Wei, Liu Paiyu, Shing, Jia the problems of obtaining evidence in computer forensics and the large amount of log processing. To this end, the cloud computing thought was introduced into computer forensics, and a cloud forensics model was proposed. This model uses agent technology to obtain evidence, enhances the autonomy and intelligence of evidence acquisition, utilizes virtualization technology and collaboration technology in cloud computing, enhances the efficiency of forensics and the security of computer evidence, introduces feedback technology and perfects the system of forensics. The experimental results verify the validity of the model. ...
Research and realization of the key technology of digital forensics based on cloud computing Jilin University She Jian True This paper introduces cloud computing technology to the problem of digital forensics with network traffic as the goal, firstly, the background knowledge of cloud computing and the background knowledge of digital forensics are introduced briefly. The paper also describes the advantages of Hadoop2.2 and the reasons of choosing this version as the base platform, then expounds the architecture of map-reduce and yarn, gives the digital forensics model of network traffic based on cloud computing, and sums up the distributed SVM algorithm that the predecessors put forward.
Research on the media Forensics service system based on cloud model Hui Wenlin Shohaiying According to the problems faced by the existing media forensics system, combined with the idea of cloud computing, this paper proposes a media forensics service system based on cloud mode. In view of the heterogeneity of large-scale media forensics service, several challenges, such as scalability and efficiency, this paper creatively proposes a three-layer media forensics service architecture model by using the hierarchical structure model, and expounds the key technologies involved in this model, namely resource virtualization, System task parallelism and adaptive ability, and finally gives ...
A tentative analysis of the challenges faced by cloud forensics bo Jiang Jianguo Hooper Liu Kunying Cloud computing platform provides the advantages of efficient utilization and scalability to attract more and more businesses and organizations to migrate business and data to the cloud computing platform. Along with the growth of cybercrime and the demand of digital forensics in cloud environment. By analyzing the feasibility of the current digital forensics process model under cloud environment, this paper discusses the challenges of digital forensics in cloud environment, and forecasts the future research direction. A tentative analysis of the challenges faced by cloud forensics
Cloud Storage Forensics:owncloud As a case studyben Martini Kim-kwang Raymond choousing A widely used open source Cloud Staas Applic Ation–owncloud–as a case stud y, we document a series of Di ...
DDoS full name is distributed denial of service (distributed Denial-of-service Attack), many Dos attack sources together attack a server constitutes a DDoS attack, the first date of DDoS dating back to the 1996, in China in 2002 began to appear frequently, 2003 has begun to take shape. And the current cloud-denial service attack, the old-fashioned cyber-crime, is now a new threat to the data center's managers. As more and more companies start using virtualized data centers and cloud services, businesses ...
Share comments: US-Asia Cupressaceae: "Small products big service" to promote rapid revenue growth Cupressaceae 300188 computer industry research institutions: Capital Securities Analyst: Deng Ting Date: 2012-04-23 "Small products big service" to promote rapid revenue growth. During the reporting period, the company increased the investment of product research and development, and began to invest in research and development in the four core areas, such as vehicle equipment, mobile terminal forensics, on-site rapid forensics, data destruction, etc. The company in 2011 to the sales department of the organizational structure of the new ...
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.