{"title":"云取证:虚拟机获取的技术方法","authors":"L. Holt, Mohammad Hammoudeh","doi":"10.1109/EISIC.2013.59","DOIUrl":null,"url":null,"abstract":"The cloud is radically changing the face of information technology. Traditional digital forensic procedures, software, and hardware are incapable of scaling to the cloud. This paper introduces a new system, leveraging cloud management SDK's to enable highly scalable Virtual Machine (VM) acquisition from cloud infrastructures.","PeriodicalId":229195,"journal":{"name":"2013 European Intelligence and Security Informatics Conference","volume":"18 ","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Cloud Forensics: A Technical Approach to Virtual Machine Acquisition\",\"authors\":\"L. Holt, Mohammad Hammoudeh\",\"doi\":\"10.1109/EISIC.2013.59\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The cloud is radically changing the face of information technology. Traditional digital forensic procedures, software, and hardware are incapable of scaling to the cloud. This paper introduces a new system, leveraging cloud management SDK's to enable highly scalable Virtual Machine (VM) acquisition from cloud infrastructures.\",\"PeriodicalId\":229195,\"journal\":{\"name\":\"2013 European Intelligence and Security Informatics Conference\",\"volume\":\"18 \",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-08-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 European Intelligence and Security Informatics Conference\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EISIC.2013.59\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 European Intelligence and Security Informatics Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EISIC.2013.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Cloud Forensics: A Technical Approach to Virtual Machine Acquisition
The cloud is radically changing the face of information technology. Traditional digital forensic procedures, software, and hardware are incapable of scaling to the cloud. This paper introduces a new system, leveraging cloud management SDK's to enable highly scalable Virtual Machine (VM) acquisition from cloud infrastructures.