메뉴 건너뛰기




Volumn , Issue , 2015, Pages 383-400

Integrating digital forensic practices in cloud incident handling: A conceptual Cloud Incident Handling Model

Author keywords

Digital forensic; Incident handling; Incident response; Index terms cloud computing; Storage as a Service

Indexed keywords


EID: 85050883948     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-0-12-801595-7.00017-3     Document Type: Chapter
Times cited : (11)

References (42)
  • 2
    • 84871979421 scopus 로고    scopus 로고
    • Let me in the cloud: analysis of the benefit and risk assessment of cloud platform
    • Aleem A., Sprott C.R. Let me in the cloud: analysis of the benefit and risk assessment of cloud platform. J. Financ. Crime 2013, 20(1):6-24.
    • (2013) J. Financ. Crime , vol.20 , Issue.1 , pp. 6-24
    • Aleem, A.1    Sprott, C.R.2
  • 3
    • 85054283125 scopus 로고    scopus 로고
    • Amazon CloudWatch [Online]
    • Accessed: 28-Oct-2014
    • Amazon Web Services, 2014. Amazon CloudWatch [Online]. Available: [Accessed: 28-Oct-2014]. http://aws.amazon.com/cloudwatch/.
    • (2014)
  • 6
    • 78650003609 scopus 로고    scopus 로고
    • Security metrics and security investment models
    • Springer, Berlin Heidelberg
    • Böhme R. Security metrics and security investment models. Advances in Information and Computer Security 2010, 10-24. Springer, Berlin Heidelberg.
    • (2010) Advances in Information and Computer Security , pp. 10-24
    • Böhme, R.1
  • 10
    • 77956387185 scopus 로고    scopus 로고
    • Security Guidance for Critical Areas of Focus in Cloud Computing, CSA
    • [Online], [Accessed: 01-Aug-2014]
    • Cloud Security Alliance, 2011. Security Guidance for Critical Areas of Focus in Cloud Computing, CSA [Online]. Available: [Accessed: 01-Aug-2014]. https://cloudsecurityalliance.org/guidance/csaguide.v3.0.pdf.
    • (2011)
  • 11
    • 84886731331 scopus 로고    scopus 로고
    • The Notorious Nine Cloud Computing Top Threats in 2013, CSA
    • [Online]. [Accessed: 12-Jul-2013]
    • Cloud Security Alliance, 2013. The Notorious Nine Cloud Computing Top Threats in 2013, CSA [Online]. Available: [Accessed: 12-Jul-2013]. http://www.cloudsecurityalliance.org/topthreats/.
    • (2013)
  • 18
    • 84858158707 scopus 로고    scopus 로고
    • A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing
    • Khorshed T., Ali A.B.M.S., Wasimi S.A. A survey on gaps, threat remediation challenges and some thoughts for proactive attack detection in cloud computing. Futur. Gener. Comput. Syst. 2012, 28(6):833-851.
    • (2012) Futur. Gener. Comput. Syst. , vol.28 , Issue.6 , pp. 833-851
    • Khorshed, T.1    Ali, A.B.M.S.2    Wasimi, S.A.3
  • 19
    • 84883559428 scopus 로고    scopus 로고
    • Integrated digital forensic process model
    • Kohn M.D., Eloff M.M., Eloff J.H.P. Integrated digital forensic process model. Comput. Secur. 2013, 38(2013):103-115.
    • (2013) Comput. Secur. , vol.38 , Issue.2013 , pp. 103-115
    • Kohn, M.D.1    Eloff, M.M.2    Eloff, J.H.P.3
  • 21
    • 84870243026 scopus 로고    scopus 로고
    • An integrated conceptual digital forensic framework for cloud computing
    • Martini B., Choo K.-K.R. An integrated conceptual digital forensic framework for cloud computing. Digit. Investig. 2012, 9(2):71-80.
    • (2012) Digit. Investig. , vol.9 , Issue.2 , pp. 71-80
    • Martini, B.1    Choo, K.-K.R.2
  • 22
    • 84889083567 scopus 로고    scopus 로고
    • Cloud storage forensics: ownCloud as a case study
    • Martini B., Choo K.-K.R. Cloud storage forensics: ownCloud as a case study. Digit. Investig. 2013, 10(4):1-13.
    • (2013) Digit. Investig. , vol.10 , Issue.4 , pp. 1-13
    • Martini, B.1    Choo, K.-K.R.2
  • 25
    • 33746748784 scopus 로고    scopus 로고
    • On incident handling and response: a state-of-the-art approach
    • Mitropoulos S., Patsos D., Douligeris C. On incident handling and response: a state-of-the-art approach. Comput. Secur. 2006, 25(5):351-370.
    • (2006) Comput. Secur. , vol.25 , Issue.5 , pp. 351-370
    • Mitropoulos, S.1    Patsos, D.2    Douligeris, C.3
  • 28
    • 84997032256 scopus 로고    scopus 로고
    • Handling compromised components in an IaaS cloud installation
    • Monfared A., Jaatun M.G. Handling compromised components in an IaaS cloud installation. J. Cloud Comput. Adv. Syst. Appl. 2012, 1(1):1-21.
    • (2012) J. Cloud Comput. Adv. Syst. Appl. , vol.1 , Issue.1 , pp. 1-21
    • Monfared, A.1    Jaatun, M.G.2
  • 30
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: a systematic review
    • Jan
    • Patel A., Taghavi M., Bakhtiyari K., Celestino Júnior J. An intrusion detection and prevention system in cloud computing: a systematic review. J. Netw. Comput. Appl. Jan. 2013, 36(1):25-41.
    • (2013) J. Netw. Comput. Appl. , vol.36 , Issue.1 , pp. 25-41
    • Patel, A.1    Taghavi, M.2    Bakhtiyari, K.3    Celestino Júnior, J.4
  • 31
    • 84863498411 scopus 로고    scopus 로고
    • Privacy, security and trust in cloud computing
    • Springer, London, S. Pearson, G. Yee (Eds.)
    • Pearson S. Privacy, security and trust in cloud computing. Privacy and Security for Cloud Computing 2013, 3-42. Springer, London. S. Pearson, G. Yee (Eds.).
    • (2013) Privacy and Security for Cloud Computing , pp. 3-42
    • Pearson, S.1
  • 33
    • 84875147433 scopus 로고    scopus 로고
    • Digital droplets: microsoft SkyDrive forensic data remnants
    • Quick D., Choo K.-K.R. Digital droplets: microsoft SkyDrive forensic data remnants. Futur. Gener. Comput. Syst. 2013, 29(6):1378-1394.
    • (2013) Futur. Gener. Comput. Syst. , vol.29 , Issue.6 , pp. 1378-1394
    • Quick, D.1    Choo, K.-K.R.2
  • 35
    • 84916918767 scopus 로고    scopus 로고
    • A survey of information security incident handling in the cloud
    • Rahman N.H.A., Choo K.-K.R. A survey of information security incident handling in the cloud. Comput. Secur. 2015, 49:45-69. 10.1016/j.cose.2014.11.006.
    • (2015) Comput. Secur. , vol.49 , pp. 45-69
    • Rahman, N.H.A.1    Choo, K.-K.R.2
  • 37
    • 85054201835 scopus 로고    scopus 로고
    • A look at ownCloud
    • Saha A. A look at ownCloud. Linux J. 2012, 2012(218):64-75.
    • (2012) Linux J. , vol.2012 , Issue.218 , pp. 64-75
    • Saha, A.1
  • 39
    • 85054252526 scopus 로고    scopus 로고
    • Towards an Intelligent Security Event Information Management System [Online]
    • [Accessed: 05-May-2014]
    • Suarez-Tangil, G., Palomar, E., Ribagorda, A., Zhang, Y., 2014. Towards an Intelligent Security Event Information Management System [Online]. Available: [Accessed: 05-May-2014]. http://www.seg.inf.uc3m.es/papers/2013nova-AIS-SIEM.pd.
    • (2014)
    • Suarez-Tangil, G.1    Palomar, E.2    Ribagorda, A.3    Zhang, Y.4
  • 40
    • 78149296009 scopus 로고    scopus 로고
    • Advanced framework for digital forensic technologies and procedures
    • Trček D., Abie H., Skomedal A., Starc I. Advanced framework for digital forensic technologies and procedures. J. Forensic Sci. 2010, 55(6):1471-1480.
    • (2010) J. Forensic Sci. , vol.55 , Issue.6 , pp. 1471-1480
    • Trček, D.1    Abie, H.2    Skomedal, A.3    Starc, I.4
  • 42
    • 84857224540 scopus 로고    scopus 로고
    • Cyber forensics in the cloud
    • Zimmerman S., Glavach D. Cyber forensics in the cloud. IA Newsletter 2011, 14(1):4-7.
    • (2011) IA Newsletter , vol.14 , Issue.1 , pp. 4-7
    • Zimmerman, S.1    Glavach, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.