Picture of smart phone in human hand

World leading smartphone and mobile technology research at Strathclyde...

The Strathprints institutional repository is a digital archive of University of Strathclyde's Open Access research outputs. Strathprints provides access to thousands of Open Access research papers by University of Strathclyde researchers, including by Strathclyde researchers from the Department of Computer & Information Sciences involved in researching exciting new applications for mobile and smartphone technology. But the transformative application of mobile technologies is also the focus of research within disciplines as diverse as Electronic & Electrical Engineering, Marketing, Human Resource Management and Biomedical Enginering, among others.

Explore Strathclyde's Open Access research on smartphone technology now...

Strategies for intrusion monitoring in cloud services

Weir, George R. S. and Aßmuth, Andreas (2017) Strategies for intrusion monitoring in cloud services. In: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017-02-19 - 2017-02-23, NOVOTEL Athens Hotel. (In Press)

[img]
Preview
Text (Weir-Assmuth-2017-Strategies-for-intrusion-monitoring-in-cloud-services)
Weir_A_muth_2017_Strategies_for_intrusion_monitoring_in_cloud_services.pdf - Accepted Author Manuscript

Download (164kB) | Preview

Abstract

Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other event data are familiar from conventional networked hosts and transfer directly to the Cloud context. In both contexts, a major concern is the risk that monitoring systems may be targeted and impaired by intruders seeking to conceal their illicit presence and activities. We outline an approach to intrusion monitoring that aims (i) to ensure the credibility of log data and (ii) provide a means of data sharing that supports log reconstruction in the event that one or more logging systems is maliciously impaired.