Khan, Suleman, Gani, Abdullah, Wahab, Ainuddin Wahid Abdul, Iqbal, Salman, Abdelaziz, Ahmed, Muttlib, Abdel, Mahdi, Omar Adil, Shiraz, Muhammad, Al-Mayouf, Yusor Rafid Bahar, Khan, Muhammad Khurram and Chang, Victor (2016) Towards an applicability of current network forensics for cloud networks: a SWOT analysis. IEEE Access, 9800-9820. (doi:10.1109/ACCESS.2016.2631543).
Abstract
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current network forensics methods (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this study, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT-analysis. It implies that C-NFMs have a suitable impact on cloud network which further requires for reformation to ensure its applicability in cloud networks.
More information
Identifiers
Catalogue record
Export record
Altmetrics
Contributors
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.