Strategies for intrusion monitoring in cloud services
Weir, George R. S. and Aßmuth, Andreas (2017) Strategies for intrusion monitoring in cloud services. In: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017-02-19 - 2017-02-23, NOVOTEL Athens Hotel.
Preview |
Text.
Filename: Weir_A_muth_2017_Strategies_for_intrusion_monitoring_in_cloud_services.pdf
Accepted Author Manuscript Download (164kB)| Preview |
Abstract
Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other event data are familiar from conventional networked hosts and transfer directly to the Cloud context. In both contexts, a major concern is the risk that monitoring systems may be targeted and impaired by intruders seeking to conceal their illicit presence and activities. We outline an approach to intrusion monitoring that aims (i) to ensure the credibility of log data and (ii) provide a means of data sharing that supports log reconstruction in the event that one or more logging systems is maliciously impaired.
ORCID iDs
Weir, George R. S. ORCID: https://orcid.org/0000-0002-6264-4480 and Aßmuth, Andreas;-
-
Item type: Conference or Workshop Item(Paper) ID code: 59703 Dates: DateEvent27 January 2017Published2 December 2016AcceptedSubjects: Science > Mathematics > Electronic computers. Computer science Department: Faculty of Science > Computer and Information Sciences Depositing user: Pure Administrator Date deposited: 06 Feb 2017 10:35 Last modified: 11 Nov 2024 16:49 URI: https://strathprints.strath.ac.uk/id/eprint/59703