A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare

碩士 === 國防大學管理學院 === 資訊管理學系 === 100 === There are some safety-related secret worries behind the visualization structure of Cloud computing. Although they are similar to traditional cyber attack modeling, they are more complicated and the extensive scopes are broader, which make the exterior informat...

Full description

Bibliographic Details
Main Authors: Hsu,Iansue, 許硯舒
Other Authors: Woo,Taikuo
Format: Others
Language:zh-TW
Published: 2012
Online Access:http://ndltd.ncl.edu.tw/handle/56223770921970279640
id ndltd-TW-100NDMC1654028
record_format oai_dc
spelling ndltd-TW-100NDMC16540282016-04-04T04:17:47Z http://ndltd.ncl.edu.tw/handle/56223770921970279640 A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare 植基於雲端資訊戰進行數位證據蒐證鑑識機制 Hsu,Iansue 許硯舒 碩士 國防大學管理學院 資訊管理學系 100 There are some safety-related secret worries behind the visualization structure of Cloud computing. Although they are similar to traditional cyber attack modeling, they are more complicated and the extensive scopes are broader, which make the exterior information security protective equipment could not obtain the evidence effectively; furthermore, while building multiple Virtual Machine and sharing resources on a single server, if one of the machines comes up against the vulnerabilities of security, it would lead to severe impacts. As a result, we have to carefully control and manage them to avoid being targeted by hacker’s attack. Moreover, during the traditional Digital Evidence Collection and the analytic process, it may cause loses of digital evidence on account for the mis-operations by the staff members and the misuses of equipments. Traditional Honey-Pot is classified as a passive trap which entices the invaders to attack. Therefore, the objectives of active Digital Evidence Collection Forensics are to pre-deploy the collection and the analyzing equipments on the vulnerable or specific targets. Subsequently, the attack information will be recorded, analyzed, related by the system instantly. The research pre-deploy the honey-pot system in the virtualized environment, and use the additional snapshot model of VM model, to build the environment for the active Digital Evidence Collection Forensics, and to collect the host’s system, flow rare and security control facilities of the Virtual Machine. If any network attacking occurred, it will relate the event records to reconstruct the process of the network attacking event. Woo,Taikuo 伍台國 2012 學位論文 ; thesis 114 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 國防大學管理學院 === 資訊管理學系 === 100 === There are some safety-related secret worries behind the visualization structure of Cloud computing. Although they are similar to traditional cyber attack modeling, they are more complicated and the extensive scopes are broader, which make the exterior information security protective equipment could not obtain the evidence effectively; furthermore, while building multiple Virtual Machine and sharing resources on a single server, if one of the machines comes up against the vulnerabilities of security, it would lead to severe impacts. As a result, we have to carefully control and manage them to avoid being targeted by hacker’s attack. Moreover, during the traditional Digital Evidence Collection and the analytic process, it may cause loses of digital evidence on account for the mis-operations by the staff members and the misuses of equipments. Traditional Honey-Pot is classified as a passive trap which entices the invaders to attack. Therefore, the objectives of active Digital Evidence Collection Forensics are to pre-deploy the collection and the analyzing equipments on the vulnerable or specific targets. Subsequently, the attack information will be recorded, analyzed, related by the system instantly. The research pre-deploy the honey-pot system in the virtualized environment, and use the additional snapshot model of VM model, to build the environment for the active Digital Evidence Collection Forensics, and to collect the host’s system, flow rare and security control facilities of the Virtual Machine. If any network attacking occurred, it will relate the event records to reconstruct the process of the network attacking event.
author2 Woo,Taikuo
author_facet Woo,Taikuo
Hsu,Iansue
許硯舒
author Hsu,Iansue
許硯舒
spellingShingle Hsu,Iansue
許硯舒
A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
author_sort Hsu,Iansue
title A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
title_short A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
title_full A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
title_fullStr A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
title_full_unstemmed A Study On The Digital Evidence Collection Forensic Mechanism Based On Cloud Computing Warfare
title_sort study on the digital evidence collection forensic mechanism based on cloud computing warfare
publishDate 2012
url http://ndltd.ncl.edu.tw/handle/56223770921970279640
work_keys_str_mv AT hsuiansue astudyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare
AT xǔyànshū astudyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare
AT hsuiansue zhíjīyúyúnduānzīxùnzhànjìnxíngshùwèizhèngjùsōuzhèngjiànshíjīzhì
AT xǔyànshū zhíjīyúyúnduānzīxùnzhànjìnxíngshùwèizhèngjùsōuzhèngjiànshíjīzhì
AT hsuiansue studyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare
AT xǔyànshū studyonthedigitalevidencecollectionforensicmechanismbasedoncloudcomputingwarfare
_version_ 1718216005484806144