Real time monitoring of security events for forensic purposes in Cloud environments using SIEM

被引:0
|
作者
Bachane, Imane [1 ]
Adsi, Youness Idrissi Khamlichi [1 ]
Adsi, Habiba Chaoui [1 ]
机构
[1] IBN Tofail Univ Kenitra, ADSI Lab, Kenitra, Morocco
关键词
Cloud computing forensics; SIEM; Cloud Computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The use of Cloud computing keeps increasing day after day due to the unique combination of characteristics that the cloud introduce, including: on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. Though, from forensics experts' point of view, many challenges are faced when responding to incidents that have occurred in a cloud computing ecosystem. This paper examines some of the challenges in cloud forensics identified in the current research literature. Furthermore, it discusses an approach offered by researchers aiming to resolve forensics need in cloud computing. Finally, it presents a new approach for forensics investigation in the cloud based on SIEM by providing real time monitoring of security events and storing this events in order to use it as evidences in investigations.
引用
收藏
页码:P18 / P20
页数:3
相关论文
共 50 条
  • [21] Real-time Rating and Charging in federated Cloud Environments
    Flake, Stephan
    Tacken, Juergen
    Zoth, Carsten
    2012 IEEE 17TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2012,
  • [22] Real-time digital forensic triaging for cloud data analysis using MapReduce on Hadoop framework
    Povar, Digambar
    Saibharath
    Geethakumari, G.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2015, 7 (02) : 119 - 133
  • [23] Autonomous real-time monitoring of hydrological environments
    Koch, John R.
    Freiberger, Thomas V.
    30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 376 - +
  • [24] Detecting Intrusions in Federated Cloud Environments Using Security as a Service
    MacDermott, Aine
    Shi, Qi
    Kifayat, Kashif
    PROCEEDINGS 2015 INTERNATIONAL CONFERENCE ON DEVELOPMENTS IN ESYSTEMS ENGINEERING DESE 2015, 2015, : 91 - 96
  • [25] Enhancing security in Cloud using Trusted Monitoring Framework
    Fera, M. Arun
    Manikandaprabhu, C.
    Natarajan, Ilakiya
    Brinda, K.
    Darathiprincy, R.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 198 - 203
  • [26] Monitoring Items in Real Time to Enhance CAT Security
    Zhang, Jinming
    Li, Jie
    JOURNAL OF EDUCATIONAL MEASUREMENT, 2016, 53 (02) : 131 - 151
  • [27] Real-time QoS monitoring for Cloud-based Big Data Analytics Applications in Mobile Environments
    Alhamazani, Khalid
    Ranjan, Rajiv
    Jayaraman, Prem Prakash
    Mitra, Karan
    Wang, Meisong
    Huang, Zhiqiang
    Wang, Lizhe
    Rabhi, Fethi
    2014 IEEE 15TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM), VOL 1, 2014, : 337 - 340
  • [28] Dynamic Rendering of Remote Indoor Environments Using Real-Time Point Cloud Data
    Lesniak, Kevin
    Tucker, Conrad S.
    JOURNAL OF COMPUTING AND INFORMATION SCIENCE IN ENGINEERING, 2018, 18 (03)
  • [29] Security Considerations for a Real Time Landslide Monitoring System
    Karthik, A.
    Kumar, Sangeeth
    Rao, Sethuraman N.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 504 - 507
  • [30] Real-Time remote monitoring and operation of Industrial Devices using IoT and Cloud
    Raju, H. S.
    Shenoy, Sanath
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 324 - 329