1,730
Views
7
CrossRef citations to date
0
Altmetric
Articles

CFRaaS: Architectural design of a Cloud Forensic Readiness as-a-Service Model using NMB solution as a forensic agent

ORCID Icon & ORCID Icon

References

  • Brownlee, Nevil, and Erik Guttman. 1998. “Expectations for Computer Security Incident Response.” [Online]. http://www:ietf:org/rfc/rfc2350:txt.
  • Carrier, Brian D., and Eugene H. Spafford. 2004. “Defining Event Reconstruction of Digital Crime Scenes.” Journal of Forensic Science 49 (6): JFS2004127-8. doi: 10.1520/JFS2004127
  • Casey, Eoghan. 2011. Digital Evidence and Computer Crime: Forensic Science, Computers, and the Internet. Baltimore: Academic Press.
  • Delport, Waldo, Michael Köhn, and Martin S. Olivier. 2011. “Isolating a Cloud Instance for a Digital Forensic Investigation.” In ISSA.
  • Dlamini, Moses, Hein Venter, Jan Eloff, and Mariki Eloff. 2014. “Requirements for Preparing the Cloud to Become Ready for Digital Forensic Investigation.” In 13th European Conference on Cyber Warfare and Security ECCWS-2014 the University of Piraeus Piraeus, Greece, p. 242.
  • ENISA. 2009. Cloud Computing: Benefits, Risks and Recommendations for Information Security. Heraklion: European Network and Information Security Agency.
  • Gong, C., Liu, J., Zhang, Q., Chen, H., and Gong, Z. 2010. “The characteristics of cloud computing.” In Parallel Processing Workshops (ICPPW) (275–279), 39th International Conference. New York City: IEEE.
  • Hannon, Michael J. 2014. “An Increasingly Important Requirement Authentication of Digital Evidence”.
  • IDC (International Data Corporation). 2015. IDC Reveals Cloud Predictions for 2015. http://patch.com/massachusetts/framingham/idc-reveals-cloud-predictions-2015-0.
  • Innovative integration Inc. 2015–2017. Forecast: Cloud Computing to Skyrocket, Rule IT Delivery [Online]. http://www.innovativeii.com/2015-2017-forecast-cloud-computing-skyrocket-rule-delivery/.
  • ISO/IEC 27043: 2015. Information Technology-Security Techniques-Incident Investigation Principles and Processes. http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=44407.
  • Kebande, Victor R., and Hein S. Venter. 2014a. “A Cognitive Approach for Botnet Detection Using Artificial Immune System in the Cloud.” In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2014 Third International Conference (52–57). New York City: IEEE.
  • Kebande, Victor R., and Hein S. Venter. 2014b. “A Cloud Forensic Readiness Model Using a Botnet as a Service.” In The International Conference on Digital Security and Forensics (DigitalSec2014), 23–32. Ostrava: The Society of Digital Information and Wireless Communication.
  • Kebande, Victor, and H. S. Venter. 2015a. “A Functional Architecture for Cloud Forensic Readiness Large-Scale Potential Digital Evidence Analysis.” In Proceedings of the 14th European Conference on Cyber Warfare and Security 2015: ECCWS 2015, p. 373.
  • Kebande, Victor R., and Hein S. Venter. 2015b. “Adding Event Reconstruction to a Cloud Forensic Readiness Model.” In Information Security for South Africa (ISSA), 2015, pp. 1–9. IEEE.
  • Kebande, Victor R., and H. S. Venter. 2015c. “Obfuscating a Cloud-Based Botnet Towards Digital Forensic Readiness.” In ICCWS 2015-The Proceedings of the 10th International Conference on Cyber Warfare and Security, p. 434.
  • Kebande, Victor, and Hein Venter. 2015d. “Towards a Model for Characterizing Potential Digital Evidence in the Cloud Environment During Digital Forensic Readiness Process.” In ICCSM2015-3rd International Conference on Cloud Security and Management: ICCSM2015, p. 151. Academic Conferences and Publishing Limited.
  • Kebande, Victor R., and Hein S. Venter. 2016a. “On Digital Forensic Readiness in the Cloud Using a Distributed Agent-Based Solution: Issues and Challenges.” Australian Journal of Forensic Sciences, 50 (2): 1–30.
  • Kebande, Victor, and Hein Venter. 2016b. “Requirements for Achieving Digital Forensic Readiness in the Cloud Environment Using an NMB Solution.” In 11th International Conference on Cyber Warfare and Security: ICCWS2016, p. 399. Academic Conferences and Publishing Limited.
  • Kebande, Victor, and Hein Venter. 2017. “Novel Digital Forensic Readiness Technique in the Cloud Environment.” Australian Journal of Forensic Sciences. doi:10.1080/00450618.2016.1267797.
  • Killcrece, Georgia, Klaus-Peter Kossakowski, Robin Ruefle, and Mark Zajicek. 2003. State of the Practice of Computer Security Incident Response Teams (CSIRTs). (CMU/SEI Report Number: CMU/SEI-2003-TR-001). Pittsburgh, Pennsylvania: Software Engineering Institute.
  • Malan, Ruth, and Dana Bredemeyer. 2001. “Functional Requirements and Use Cases.” Bredemeyer Consulting.
  • Mell, P., and T. Grance. 2011. “The NIST Definition of Cloud Computing (Draft).” NIST Special Publication, vol. 800, p. 7.
  • Mouton, Francois, and Hein S. Venter. 2001. “Requirements for Wireless Sensor Networks in Order to Achieve Digital Forensic Readiness.” In WDFIA, pp. 108–121.
  • Palmer, Gary. 2001. “A Road Map for Digital Forensic Research.” In First Digital Forensic Research Workshop, Utica, New York (pp. 27–30).
  • Pohl, Klaus. 2010. Requirements Engineering: Fundamentals, Principles, and Techniques. Berlin: Springer Publishing Company, Incorporated.
  • Richter, Jennifer, Nicolai Kuntze, and Carsten Rudolph. 2010. “Security Digital Evidence.” In Systematic Approaches to Digital Forensic Engineering (SADFE), 2010 Fifth IEEE International Workshop on, pp. 119–130.
  • Rowlingson, Robert. 2004. “A Ten Step Process for Forensic Readiness.” International Journal of Digital Evidence 2 (3): 1–28.
  • Shropshire, J. 2015. “Securing Cloud Infrastructure: Unobtrusive Techniques for Detecting Hypervisor Compromise.” In ICCSM2015-3rd International Conference on Cloud Security and Management: ICCSM2015. Sonning Common: Academic Conferences and Publishing International.
  • Spyridopoulos, Theodoros, and Vasilios Katos. 2011. “Requirements for a Forensically Ready Cloud Storage Service.” International Journal of Digital Crime and Forensics 3 (3): 19–36. doi: 10.4018/jdcf.2011070102
  • Tan, John. 2001. “Forensic Readiness.” Cambridge, MA:@ Stake: 1–23.
  • Valjarevic, Aleksander, and Hein Venter. 2015. A Comprehensive and Harmonised Digital Forensic Investigation Process Model. Pretoria: University of Pretoria.
  • Varia, Jinesh. 2008. “Cloud Architectures.” White Paper of Amazon, jineshvaria.s3.amazonaws.com/public/cloudarchitectures-varia.pdf: 16.
  • Yasinsac, Alec, and Yanet Manzano. 2001. “Policies to Enhance Computer and Network Forensics.” In Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pp. 289–295.