Analysis of Dataset in Private Cloud for Cloud Forensics Using Eucalyptus and Hadoop

Mayur S. Patil, B. Ainapure
{"title":"Analysis of Dataset in Private Cloud for Cloud Forensics Using Eucalyptus and Hadoop","authors":"Mayur S. Patil, B. Ainapure","doi":"10.1109/ICSSIT46314.2019.8987923","DOIUrl":null,"url":null,"abstract":"At present, in most of the areas of research, development and daily usage, almost all platforms and service providers are dependent on cloud computing. To achieve scalability and sustainability, cloud architecture is considered as a result of technological amalgamation. If the design of the architecture is complex in nature, it could have adverse effects on data recoverability and analysis when the system gets compromised. This type of structure introduces issues like inherent architecture flaws, backdoors, code smelling which could lead to exploitable vulnerabilities for hackers and scammers. Likewise, its complex nature puts limits on forensic investigation methods. For such problems, digital forensic provides a solution. It uses the three-stage approach which consists of evidence collection eye-witnessed by the user, evidence preservation in an unaltered way, offline safeguarding of evidence for feigning its collection. Among its various methods like live forensics, timeline analysis, logging, sandboxing, logging is generalized and easy to use method. The proposed work is about digital forensic technique, log analysis, which is the most effective approach to override investigation issues in the cloud environment. Snort, Network Intrusion Detection System (NIDS), will work as a daemon on Eucalyptus private cloud to monitor and log intrusive attempts of network activities on it. Second, the proposed approach will fix the incapability of Eucalyptus to export logs to the rSyslog server. Third, the generated datasets, irrespective of location and format, would be analyzed by Hadoop, for improved analysis of a system.","PeriodicalId":330309,"journal":{"name":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","volume":"632 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Smart Systems and Inventive Technology (ICSSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSSIT46314.2019.8987923","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

At present, in most of the areas of research, development and daily usage, almost all platforms and service providers are dependent on cloud computing. To achieve scalability and sustainability, cloud architecture is considered as a result of technological amalgamation. If the design of the architecture is complex in nature, it could have adverse effects on data recoverability and analysis when the system gets compromised. This type of structure introduces issues like inherent architecture flaws, backdoors, code smelling which could lead to exploitable vulnerabilities for hackers and scammers. Likewise, its complex nature puts limits on forensic investigation methods. For such problems, digital forensic provides a solution. It uses the three-stage approach which consists of evidence collection eye-witnessed by the user, evidence preservation in an unaltered way, offline safeguarding of evidence for feigning its collection. Among its various methods like live forensics, timeline analysis, logging, sandboxing, logging is generalized and easy to use method. The proposed work is about digital forensic technique, log analysis, which is the most effective approach to override investigation issues in the cloud environment. Snort, Network Intrusion Detection System (NIDS), will work as a daemon on Eucalyptus private cloud to monitor and log intrusive attempts of network activities on it. Second, the proposed approach will fix the incapability of Eucalyptus to export logs to the rSyslog server. Third, the generated datasets, irrespective of location and format, would be analyzed by Hadoop, for improved analysis of a system.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于Eucalyptus和Hadoop的云取证私有云数据集分析
目前,在研究、开发和日常使用的大部分领域,几乎所有的平台和服务提供商都依赖于云计算。为了实现可伸缩性和可持续性,云架构被认为是技术融合的结果。如果体系结构的设计本质上是复杂的,那么当系统受到损害时,它可能会对数据的可恢复性和分析产生不利影响。这种类型的结构引入了诸如固有架构缺陷、后门、代码嗅探等问题,这些问题可能导致黑客和骗子利用漏洞。同样,它的复杂性也限制了法医调查方法。对于这些问题,数字取证提供了解决方案。它采用了用户亲眼目睹证据收集、证据不变保存、伪造证据收集的离线证据保护三个阶段的方法。在实时取证、时间线分析、日志记录、沙盒等多种方法中,日志记录是一种通用且易于使用的方法。建议的工作是关于数字取证技术,日志分析,这是在云环境中覆盖调查问题的最有效方法。Snort,即网络入侵检测系统(NIDS),将作为Eucalyptus私有云上的守护进程来监视和记录对其上网络活动的入侵尝试。其次,建议的方法将修复Eucalyptus无法将日志导出到rSyslog服务器的问题。第三,生成的数据集,无论位置和格式如何,都将由Hadoop进行分析,以改进系统分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Improving End User Experience in Software Application Using a Design Scheme for Effective Exception Handling Dynamic Virtual Machine Scheduling Approach for Minimizing the Response Time Using Distance Aware Virtual Machine Scheduler in Cloud Computing Smart Carnatic Music Note Identification (CMNI) System using Probabilistic Neural Network Dynamic Heterogeneous scheduling of GPU-CPU in Distributed Environment Review on 5G Multi-Carrier MIMO-OFDM Systems using Channel Estimation Techniques
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1