Picture of boy being examining by doctor at a tuberculosis sanatorium

Understanding our future through Open Access research about our past...

Strathprints makes available scholarly Open Access content by researchers in the Centre for the Social History of Health & Healthcare (CSHHH), based within the School of Humanities, and considered Scotland's leading centre for the history of health and medicine.

Research at CSHHH explores the modern world since 1800 in locations as diverse as the UK, Asia, Africa, North America, and Europe. Areas of specialism include contraception and sexuality; family health and medical services; occupational health and medicine; disability; the history of psychiatry; conflict and warfare; and, drugs, pharmaceuticals and intoxicants.

Explore the Open Access research of the Centre for the Social History of Health and Healthcare. Or explore all of Strathclyde's Open Access research...

Image: Heart of England NHS Foundation Trust. Wellcome Collection - CC-BY.

Strategies for intrusion monitoring in cloud services

Weir, George R. S. and Aßmuth, Andreas (2017) Strategies for intrusion monitoring in cloud services. In: The Eighth International Conference on Cloud Computing, GRIDs, and Virtualization, 2017-02-19 - 2017-02-23, NOVOTEL Athens Hotel.

[img]
Preview
Text (Weir-Assmuth-2017-Strategies-for-intrusion-monitoring-in-cloud-services)
Weir_A_muth_2017_Strategies_for_intrusion_monitoring_in_cloud_services.pdf
Accepted Author Manuscript

Download (164kB) | Preview

Abstract

Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other event data are familiar from conventional networked hosts and transfer directly to the Cloud context. In both contexts, a major concern is the risk that monitoring systems may be targeted and impaired by intruders seeking to conceal their illicit presence and activities. We outline an approach to intrusion monitoring that aims (i) to ensure the credibility of log data and (ii) provide a means of data sharing that supports log reconstruction in the event that one or more logging systems is maliciously impaired.