A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
碩士 === 國防大學管理學院 === 資訊管理學系 === 100 === There are some safety-related secret worries behind the visualization structure of Cloud computing. Although they are similar to traditional cyber attack modeling, they are more complicated and the extensive scopes are broader, which make the exterior informat...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2012
|
Online Access: | http://ndltd.ncl.edu.tw/handle/56223770921970279640 |
id |
ndltd-TW-100NDMC1654028 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-100NDMC16540282016-04-04T04:17:47Z http://ndltd.ncl.edu.tw/handle/56223770921970279640 A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare 植基於雲端資訊戰進行數位證據蒐證鑑識機制 Hsu,Iansue 許硯舒 碩士 國防大學管理學院 資訊管理學系 100 There are some safety-related secret worries behind the visualization structure of Cloud computing. Although they are similar to traditional cyber attack modeling, they are more complicated and the extensive scopes are broader, which make the exterior information security protective equipment could not obtain the evidence effectively; furthermore, while building multiple Virtual Machine and sharing resources on a single server, if one of the machines comes up against the vulnerabilities of security, it would lead to severe impacts. As a result, we have to carefully control and manage them to avoid being targeted by hacker’s attack. Moreover, during the traditional Digital Evidence Collection and the analytic process, it may cause loses of digital evidence on account for the mis-operations by the staff members and the misuses of equipments. Traditional Honey-Pot is classified as a passive trap which entices the invaders to attack. Therefore, the objectives of active Digital Evidence Collection Forensics are to pre-deploy the collection and the analyzing equipments on the vulnerable or specific targets. Subsequently, the attack information will be recorded, analyzed, related by the system instantly. The research pre-deploy the honey-pot system in the virtualized environment, and use the additional snapshot model of VM model, to build the environment for the active Digital Evidence Collection Forensics, and to collect the host’s system, flow rare and security control facilities of the Virtual Machine. If any network attacking occurred, it will relate the event records to reconstruct the process of the network attacking event. Woo,Taikuo 伍台國 2012 學位論文 ; thesis 114 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 國防大學管理學院 === 資訊管理學系 === 100 === There are some safety-related secret worries behind the visualization structure of Cloud computing. Although they are similar to traditional cyber attack modeling, they are more complicated and the extensive scopes are broader, which make the exterior information security protective equipment could not obtain the evidence effectively; furthermore, while building multiple Virtual Machine and sharing resources on a single server, if one of the machines comes up against the vulnerabilities of security, it would lead to severe impacts. As a result, we have to carefully control and manage them to avoid being targeted by hacker’s attack.
Moreover, during the traditional Digital Evidence Collection and the analytic process, it may cause loses of digital evidence on account for the mis-operations by the staff members and the misuses of equipments. Traditional Honey-Pot is classified as a passive trap which entices the invaders to attack. Therefore, the objectives of active Digital Evidence Collection Forensics are to pre-deploy the collection and the analyzing equipments on the vulnerable or specific targets. Subsequently, the attack information will be recorded, analyzed, related by the system instantly.
The research pre-deploy the honey-pot system in the virtualized environment, and use the additional snapshot model of VM model, to build the environment for the active Digital Evidence Collection Forensics, and to collect the host’s system, flow rare and security control facilities of the Virtual Machine. If any network attacking occurred, it will relate the event records to reconstruct the process of the network attacking event.
|
author2 |
Woo,Taikuo |
author_facet |
Woo,Taikuo Hsu,Iansue 許硯舒 |
author |
Hsu,Iansue 許硯舒 |
spellingShingle |
Hsu,Iansue 許硯舒 A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare |
author_sort |
Hsu,Iansue |
title |
A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare |
title_short |
A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare |
title_full |
A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare |
title_fullStr |
A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare |
title_full_unstemmed |
A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare |
title_sort |
study on the digital evidence collection forensic mechanism based on cloud computing warfare |
publishDate |
2012 |
url |
http://ndltd.ncl.edu.tw/handle/56223770921970279640 |
work_keys_str_mv |
AT hsuiansue astudyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare AT xǔyànshū astudyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare AT hsuiansue zhíjīyúyúnduānzīxùnzhànjìnxíngshùwèizhèngjùsōuzhèngjiànshíjīzhì AT xǔyànshū zhíjīyúyúnduānzīxùnzhànjìnxíngshùwèizhèngjùsōuzhèngjiànshíjīzhì AT hsuiansue studyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare AT xǔyànshū studyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare |
_version_ |
1718216005484806144 |