TY - JOUR
T1 - Towards an Applicability of Current Network Forensics for Cloud Networks
T2 - A SWOT Analysis
AU - Khan, Suleman
AU - Gani, Abdullah
AU - Abdul Wahab, Ainuddin Wahid
AU - Iqbal, Salman
AU - Abdelaziz, Ahmed
AU - Mahdi, Omar Adil
AU - Abdallaahmed, Abdelmuttlib Ibrahim
AU - Shiraz, Muhammad
AU - Al-Mayouf, Yusor Rafid Bahar
AU - Khan, Ziar
AU - Ko, Kwangman
AU - Khan, Muhammad Khurram
AU - Chang, Victor
N1 - Publisher Copyright:
© 2016 IEEE.
PY - 2016
Y1 - 2016
N2 - In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
AB - In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks.
KW - Cloud investigation
KW - Cloud networks
KW - SWOT analysis
KW - network forensics
UR - http://www.scopus.com/inward/record.url?scp=85015228022&partnerID=8YFLogxK
U2 - 10.1109/ACCESS.2016.2631543
DO - 10.1109/ACCESS.2016.2631543
M3 - Article
AN - SCOPUS:85015228022
SN - 2169-3536
VL - 4
SP - 9800
EP - 9820
JO - IEEE Access
JF - IEEE Access
M1 - 7802631
ER -