The University of Southampton
University of Southampton Institutional Repository

Towards an applicability of current network forensics for cloud networks: a SWOT analysis

Towards an applicability of current network forensics for cloud networks: a SWOT analysis
Towards an applicability of current network forensics for cloud networks: a SWOT analysis
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current network forensics methods (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this study, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT-analysis. It implies that C-NFMs have a suitable impact on cloud network which further requires for reformation to ensure its applicability in cloud networks.
cloud security, cloud investigation, network forensics, network security
9800-9820
Khan, Suleman
2b2c4ac8-df5b-4abd-bcf3-b06a0b4b989d
Gani, Abdullah
fb6c3735-3015-40df-b9e3-e2cdfae39da3
Wahab, Ainuddin Wahid Abdul
77200ce1-c37f-44b3-8d98-91267a06a914
Iqbal, Salman
b15fa224-21b8-4ecf-ac36-a607485cb145
Abdelaziz, Ahmed
8d5e4d88-0b78-4d38-987e-3ff96bada772
Muttlib, Abdel
acd06d4c-622a-4fc5-8beb-7ec330190fd5
Mahdi, Omar Adil
7fc4973e-4cbd-4b3f-85f4-022d6f22099c
Shiraz, Muhammad
d3261c3c-972d-4a44-a709-843c5ccc0341
Al-Mayouf, Yusor Rafid Bahar
b7bd3053-becd-4447-8fd3-7581c49a377c
Khan, Muhammad Khurram
87436a42-783f-48e7-a535-3b7545837dbb
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4
Khan, Suleman
2b2c4ac8-df5b-4abd-bcf3-b06a0b4b989d
Gani, Abdullah
fb6c3735-3015-40df-b9e3-e2cdfae39da3
Wahab, Ainuddin Wahid Abdul
77200ce1-c37f-44b3-8d98-91267a06a914
Iqbal, Salman
b15fa224-21b8-4ecf-ac36-a607485cb145
Abdelaziz, Ahmed
8d5e4d88-0b78-4d38-987e-3ff96bada772
Muttlib, Abdel
acd06d4c-622a-4fc5-8beb-7ec330190fd5
Mahdi, Omar Adil
7fc4973e-4cbd-4b3f-85f4-022d6f22099c
Shiraz, Muhammad
d3261c3c-972d-4a44-a709-843c5ccc0341
Al-Mayouf, Yusor Rafid Bahar
b7bd3053-becd-4447-8fd3-7581c49a377c
Khan, Muhammad Khurram
87436a42-783f-48e7-a535-3b7545837dbb
Chang, Victor
a7c75287-b649-4a63-a26c-6af6f26525a4

Khan, Suleman, Gani, Abdullah, Wahab, Ainuddin Wahid Abdul, Iqbal, Salman, Abdelaziz, Ahmed, Muttlib, Abdel, Mahdi, Omar Adil, Shiraz, Muhammad, Al-Mayouf, Yusor Rafid Bahar, Khan, Muhammad Khurram and Chang, Victor (2016) Towards an applicability of current network forensics for cloud networks: a SWOT analysis. IEEE Access, 9800-9820. (doi:10.1109/ACCESS.2016.2631543).

Record type: Article

Abstract

In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current network forensics methods (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this study, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT-analysis. It implies that C-NFMs have a suitable impact on cloud network which further requires for reformation to ensure its applicability in cloud networks.

Text
FSI_Swot_IEEE_access_accepted.pdf - Accepted Manuscript
Download (1MB)
Text
stamp.jsp_arnumber=7802631&tag=1 - Version of Record
Available under License Other.
Download (3kB)

More information

Accepted/In Press date: 9 November 2016
Published date: 30 December 2016
Keywords: cloud security, cloud investigation, network forensics, network security
Organisations: Electronic & Software Systems

Identifiers

Local EPrints ID: 403535
URI: http://eprints.soton.ac.uk/id/eprint/403535
PURE UUID: 0712f897-3955-43de-9de5-56164f142d62

Catalogue record

Date deposited: 03 Dec 2016 17:33
Last modified: 15 Mar 2024 03:44

Export record

Altmetrics

Contributors

Author: Suleman Khan
Author: Abdullah Gani
Author: Ainuddin Wahid Abdul Wahab
Author: Salman Iqbal
Author: Ahmed Abdelaziz
Author: Abdel Muttlib
Author: Omar Adil Mahdi
Author: Muhammad Shiraz
Author: Yusor Rafid Bahar Al-Mayouf
Author: Muhammad Khurram Khan
Author: Victor Chang

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×