최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.33 no.3, 2023년, pp.487 - 498
노현 (성신여자대학교) , 옥지원 (성신여자대학교) , 김성민 (성신여자대학교)
Security incidents using vulnerabilities in cloud services occur, but it is difficult to collect and analyze traces of incidents in cloud environments with complex and diverse service models. As a result, the importance of cloud forensics research has emerged, and infringement response scenarios mus...
Sarah Park, Beomseok Kim, Sungmin Jo, Korea Cloud Opportunity Forecast by Industry, 2021-2025, May. 2022.?
eNsecure, "Cloud Transformation and Security Response," PASCON 2022, 2022.?
S. Zawoad, A. K. Dutta andR.Hasan, "Towards building forensics enabled cloud through secure logging-as-a- service," IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 2, pp.148-162, Apr. 2016.?
Pichan, A. and Lazarescu, M. andSoh, S.T., "Towards a practical cloud forensics logging framework," Journal of Information Security and Applications, vol. 42, pp. 18-28, 2018.?
C. P. Grobler, C. P. Louwrens and S. H. von Solms, "A multi-component view of digital forensics," 2010 International Conference on Availability, Reliability and Security, pp. 647-652, Mar. 2010.?
Soltan Abed Alharbi, Jens H.Weber-Jahnke, Issa Traore, "The proactive and reactive digital forensics investigation process: A systematic literature review," International Journal of Security and its Applications, vol.5, No.4, pp. 59-72, Aug. 2011.?
Github, "Cloudfox" https://github.com/BishopFox/cloudfox, Sep. 2022.?
Github, "AWSBucketDump" https://github.com/jordanpotti/AWSBucketDump, Jun. 2017.?
Github, "Blob Hunter" https://github.com/cyberark/BlobHunter, Jan. 2021.?
A. Sedighi and D. Jacobson, "Forensic analysis of cloud virtual environments," 2019 IEEE International Conference on Computational Science and Engineering and IEEE International Conference on Embedded and Ubiquitous Computing, pp. 323-329, Dec. 2019.?
Jason E James, "An exploration in forensic evidence in a cloud computing environment," International Association for Computer Information Systems, vol. 22, pp. 250-259, 2021.?
Sebastien Philomin, Avinash Singh, Adeyemi Ikuesan, H.s Venter, "Digital forensic readiness framework for smart homes," International Conference on Cyber Warfare and Security. Academic Conferences International Limited, pp. 627-XVIII, Mar. 2020.?
Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Muhammad Shiraz, Samee U. Khan, Rajkumar Buyya, Albert Y. Zomaya, "Cloud log forensics: foundations, state of the art, and future directions," ACM Computing Surveys, vol. 49, pp. 1-42, Mar. 2017.?
AWS, Amazon CloudTrail, http://awsdocs.s3.amazonaws.com/awscloudtrail/latest/awscloudtrail-ug.pdf, Nov. 2022.?
AWS, Amazon GuardDuty, https://docs.aws.amazon.com/pdfs/guardduty/latest/ug/guardduty-ug.pdf, Nov. 2017.?
Ivan Orton, J.D., Aaron Alva, Barbara Endicott-Popovsky, "Legal process and requirements for cloud forensic investigations," Cybercrime and Cloud Forensics: Applications for Investigation Processes. IGI Global, pp. 186-229, Jan. 2013.?
Kwon Yang-sub, "Major issues and suggestions of investigation procedures for extra-territorial search and seizure of digital information," Journal of Law research, 37(1), pp.43-64, Mar. 2021.?
I.-H. Jeong, J.-H. Oh, J.-H. Park,and S.-J. Lee, "Digital forensic methodology of iaas cloud computing service," Journal of the Korea Institute of Information Security and Cryptology, 21(6), pp. 55-65, Dec.2011.?
McAfee, "Cloud Adoption and Risk Report,", 2019.?
Trendmicro, "Azure misconfiguration" The Most Common Cloud Misconfigurations That Could Lead to Security Breaches, https://www.trendmicro.com/vinfo/hk-en/security/news/virtualization-and-cloud/the-most-common-cloud-misconfigurations-that-could-lead-to-security-breaches (Accessed on October 25 2022).?
Github, "S3Scanner" https://github.com/sa7mon/S3Scanner, Jun. 2017.?
Comparitech, "aws bucket credentials" It takes hackers 1 minute to find and abuse credentials exposed on GitHub, https://www.comparitech.com/blog/information-security/github-honeypot/ (Accessed on October 25 2022).
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.