Strategies for intrusion monitoring in cloud services

George R. S. Weir, Andreas Aßmuth

Research output: Contribution to conferencePaper

118 Downloads (Pure)

Abstract

Effective activity and event monitoring is an essential aspect of digital forensic readiness. Techniques for capturing log and other event data are familiar from conventional networked hosts and transfer directly to the Cloud context. In both contexts, a major concern is the risk that monitoring systems may be targeted and impaired by intruders seeking to conceal their illicit presence and activities. We outline an approach to intrusion monitoring that aims (i) to ensure the credibility of log data and (ii) provide a means of data sharing that supports log reconstruction in the event that one or more logging systems is maliciously impaired.
Original languageEnglish
Pages1-5
Number of pages5
Publication statusPublished - 27 Jan 2017
EventThe Eighth International Conference on Cloud Computing, GRIDs, and Virtualization - NOVOTEL Athens Hotel, Athens, Greece
Duration: 19 Feb 201723 Feb 2017
http://www.iaria.org/conferences2017/CLOUDCOMPUTING17.html

Conference

ConferenceThe Eighth International Conference on Cloud Computing, GRIDs, and Virtualization
Abbreviated titleCloud Computing 2017
CountryGreece
CityAthens
Period19/02/1723/02/17
Internet address

Keywords

  • cloud security
  • intrusion monitoring
  • message authentication codes
  • secret sharing

Fingerprint Dive into the research topics of 'Strategies for intrusion monitoring in cloud services'. Together they form a unique fingerprint.

Cite this