메뉴 건너뛰기




Volumn , Issue , 2010, Pages 77-85

Towards incident handling in the cloud: Challenges and approaches

Author keywords

CERT; Cloud computing; CSIRT; Incident handling

Indexed keywords

CERT; CLOUD COMPUTING; CLOUD SERVICES; CSIRT; HANDLING PROCESS; INCIDENT HANDLING; INTEGRAL PART; OPERATIONAL MODEL; RESEARCH AGENDA; SECURITY INCIDENT; SECURITY MANAGEMENT;

EID: 78650100295     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1866835.1866850     Document Type: Conference Paper
Times cited : (65)

References (31)
  • 2
    • 77950555514 scopus 로고    scopus 로고
    • Guidelines for evidence collection and archiving
    • Best Current Practice Feb.
    • D. Brezinski and T. Killalea. Guidelines for Evidence Collection and Archiving. RFC 3227 (Best Current Practice), Feb. 2002.
    • (2002) RFC 3227
    • Brezinski, D.1    Killalea, T.2
  • 3
    • 70450124985 scopus 로고    scopus 로고
    • Expectations for computer security incident response
    • Best Current Practice June
    • N. Brownlee and E. Guttman. Expectations for Computer Security Incident Response. RFC 2350 (Best Current Practice), June 1998.
    • (1998) RFC 2350
    • Brownlee, N.1    Guttman, E.2
  • 4
    • 78650133447 scopus 로고    scopus 로고
    • Incident response in virtual environments: Challenges in the cloud
    • Miami, USA, June
    • R. M. Bryan Casper. Incident response in virtual environments: Challenges in the cloud. In 22nd Annual FIRST Conference, Miami, USA, June 2010.
    • (2010) 22nd Annual FIRST Conference
    • Bryan Casper, R.M.1
  • 7
    • 78650114525 scopus 로고    scopus 로고
    • Cloud Security Alliance. Trusted Cloud Initiative. http://www. cloudsecurityalliance.org/trustedcloud.html.
    • Trusted Cloud Initiative
  • 8
    • 34247893069 scopus 로고    scopus 로고
    • Mailbox names for common services, roles and functions
    • (Proposed Standard), May
    • D. Crocker. Mailbox Names for Common Services, Roles and Functions. RFC 2142 (Proposed Standard), May 1997.
    • (1997) RFC 2142
    • Crocker, D.1
  • 9
    • 77956576296 scopus 로고    scopus 로고
    • The incident object description exchange format
    • (Proposed Standard), Dec.
    • R. Danyliw, J. Meijer, and Y. Demchenko. The Incident Object Description Exchange Format. RFC 5070 (Proposed Standard), Dec. 2007.
    • (2007) RFC 5070
    • Danyliw, R.1    Meijer, J.2    Demchenko, Y.3
  • 11
    • 70350716910 scopus 로고    scopus 로고
    • The intrusion detection message exchange format (IDMEF)
    • (Experimental), Mar.
    • H. Debar, D. Curry, and B. Feinstein. The Intrusion Detection Message Exchange Format (IDMEF). RFC 4765 (Experimental), Mar. 2007.
    • (2007) RFC 4765
    • Debar, H.1    Curry, D.2    Feinstein, B.3
  • 15
    • 78650079030 scopus 로고    scopus 로고
    • Aug.
    • Honeynet Project & Research Alliance. Honeywall CDROM Roo, Aug. 2005. http://www.honeynet.org.
    • (2005) Honeywall CDROM Roo
  • 17
    • 34548474923 scopus 로고    scopus 로고
    • IT Governance Institute Illinois, USA. CobiT 4.1
    • IT Governance Institute, Rolling Meadows, Illinois, USA. CobiT 4.1, 2007.
    • (2007) Rolling Meadows
  • 18
    • 77957937277 scopus 로고    scopus 로고
    • Research challenges for enterprise cloud computing
    • abs/1001.3257
    • A. Khajeh-Hosseini, I. Sommerville, and I. Sriram. Research challenges for enterprise cloud computing. CoRR, abs/1001.3257, 2010.
    • (2010) CoRR
    • Khajeh-Hosseini, A.1    Sommerville, I.2    Sriram, I.3
  • 24
    • 77950559014 scopus 로고    scopus 로고
    • Intrusion detection in the cloud
    • IEEE International Symposium on Los Alamitos, CA, USA IEEE Computer Society
    • S. Roschke, F. Cheng, and C. Meinel. Intrusion detection in the cloud. In Dependable, Autonomic and Secure Computing, IEEE International Symposium on, volume 0, pages 729-734, Los Alamitos, CA, USA, 2009. IEEE Computer Society.
    • (2009) Dependable, Autonomic and Secure Computing , pp. 729-734
    • Roschke, S.1    Cheng, F.2    Meinel, C.3
  • 25
    • 78650159518 scopus 로고    scopus 로고
    • Forensics considerations in the next generation cloud environments
    • Miami, USA, June
    • R. Rounsavall. Forensics considerations in the next generation cloud environments. In 22nd Annual FIRST Conference, Miami, USA, June 2010.
    • (2010) 22nd Annual FIRST Conference
    • Rounsavall, R.1
  • 26
    • 42649130329 scopus 로고    scopus 로고
    • Windows memory forensics
    • N. Ruff. Windows memory forensics. Journal in Computer Virology, 4(2):83-100, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.2 , pp. 83-100
    • Ruff, N.1
  • 27
    • 33745993901 scopus 로고    scopus 로고
    • Searching for processes and threads in microsoft windows memory dumps
    • A. Schuster. Searching for processes and threads in microsoft windows memory dumps. Digital Investigation, 3(Supplement 1):10-16, 2006.
    • (2006) Digital Investigation , vol.3 , Issue.SUPPL. 1 , pp. 10-16
    • Schuster, A.1
  • 29
    • 77955298724 scopus 로고    scopus 로고
    • The CEE Board. Common event expression, 2008. http://cee.mitre.org/docs/ Common-Event-Expression-White-Paper-June-2008.pdf.
    • (2008) Common Event Expression


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.