U.S. flag   An unofficial archive of your favorite United States government website
Dot gov

Official websites do not use .rip
We are an unofficial archive, replace .rip by .gov in the URL to access the official website. Access our document index here.

Https

We are building a provable archive!
A lock (Dot gov) or https:// don't prove our archive is authentic, only that you securely accessed it. Note that we are working to fix that :)

Measuring Security Risk in Enterprise Networks

Techniques for Network and Cloud Forensics Analysis

Cloud computing provides several benefits to organizations such as increased flexibility, scalability and reduced cost. However, it provides several challenges for digital forensics and criminal investigation.  Existing forensics analysis frameworks and tools are largely intended for off line investigation and it is assumed that the logs are under the control of the investigator. In cloud computing, the evidence can be distributed across several machines and they can be stored on machines that are beyond the control of the investigator. Some other challenges are the dependence of forensically valuable data on the cloud deployment model, multiple virtual machines running on a single physical machine and multiple tenants on the same physical machine.

In this part of the project, we show what evidence from the cloud would be useful to re-construct the attack scenario by using a Prolog logic based forensic analysis tool. Our example attacks show how evidence from three different sources can help investigators to construct attack scenarios, which include (1) IDS and application software logging, (2) cloud service API calls and (3) system calls from VMs.

Contacts

Dr. Anoop Singhal - National Institute of Standards and Technology / Computer Security Division
anoop.singhal@nist.gov
301-975-4432

Created November 30, 2016, Updated June 22, 2020