Intelligent Systems for Cloud SAAS Forensic
DOI:
https://doi.org/10.48001/jowacs.2024.2131-41Keywords:
Analysis, Attacks, Challenges, Cloud environment, Evidence, Forensic investigation, Forensic tool, SaaSCarAbstract
The rapid growth of Software-as-a-Service (SaaS) applications in cloud environments has introduced new challenges for digital forensics investigators. Traditional forensic methods are often insufficient to collect, preserve, and analyze digital evidence from cloud-based environments. To address these challenges, this scope will propose the development of an Intelligent System for Cloud SaaS Forensic (ISC-SF) for OpenStack environment. The ISC-SF will integrate machine learning algorithms with the SaaS model and will present the algorithms to design for attribute selection, machine learning model training, attack detection, evidence extraction, collection, and analysis. This paper provides an overview of OpenStack architecture, OpenStack services, and log locations. The ISC-SF aims to revolutionize the field of cloud SaaS forensic investigation by leveraging intelligent algorithms in a controlled cloud environment
Downloads
References
Ahsan, M. M., Wahab, A. W. B. A., Idris, M. Y. I. B., Khan, S., Bachura, E., & Choo, K. K. R. (2018). Class: cloud log assuring soundness and secrecy scheme for cloud forensics. IEEE Transactions on Sustainable Computing, (2), 184-196. https://doi.org/10.1109/TSUSC.2018.2833502.
Chou, T. S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3), 79.
https://doi.org/10.5121/ijcsit.2013.5306
Dykstra, J., & Sherman, A. T. (2013). Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform. Digital Investigation. S87–S95.
https://doi.org/10.1016/j.diin.2013.06.010.
Moussa, A. N., Ithnin, N., & Zainal, A. (2018). CFaaS: bilaterally agreed evidence collection. Journal of Cloud Computing, 7(1), 1-19.
https://doi.org/10.1186/s13677-017-0102-3.
Ozgur, A., & Erdem, H. (2016). A review of KDD99 dataset usage in intrusion detection and machine learning between 2010 and 2015. PeerJ Preprints,
https://doi.org/10.7287/peerj.preprints.1954v1.
Pichan, A., Lazarescu, M., & Soh, S. T. (2015). Cloud forensics: Technical challenges, solutions and comparative analysis. Digital Investigation, 13, 38-57.
https://doi.org/10.1016/j.diin.2015.03.002.
Pilli, E. S., Joshi, R. C., & Niyogi, R. (2010). Network forensic frameworks: Survey and research challenges. Digital Investigation, 7(1-2), 14-27.
https://doi.org/10.1016/j.diin.2010.02.003.
Popovic, K., & Hocenski, Ž. (2010, May). Cloud computing security issues and challenges. In The 33rd International Convention Mipro (pp. 344-349). IEEE.
https://ieeexplore.ieee.org/abstract/document/5533317.
Zawoad, S., Hasan, R., & Skjellum, A. (2015, June). OCF: An open cloud forensics model for reliable digital forensics. In 2015 IEEE 8th International Conference on Cloud Computing (pp. 437-444). IEEE.
Downloads
![](https://www.crossref.org/images/documentation/Crossmark-check-for-updates.png)