DocumentCode :
2961654
Title :
Cyber Crime Scene Investigations (C²SI) through Cloud Computing
Author :
Fu, Xinwen ; Ling, Zhen ; Yu, Wei ; Luo, Junzhou
Author_Institution :
Univ. of Massachusetts Lowell, Lowell, MA, USA
fYear :
2010
fDate :
21-25 June 2010
Firstpage :
26
Lastpage :
31
Abstract :
Cloud computing brings opportunities for network forensics tracing Internet criminals in the distributed environment. We may use the new “pay-as-you-go” model of the cloud computing to deploy the on-demand cyber surveillance sentinels and conduct distributed trace back in complicated cyber crime scene investigations. To trace criminals abusing anonymous communication networks such as Tor, law enforcement can deploy high-bandwidth Amazon EC2 sentinels into the Tor network. Some sentinels are configured as Tor entry guards and others work as Tor exits nodes. With the high bandwidth and appropriate number of such sentinels, we can achieve a required probability that a Tor circuit passes through an entry sentinel and an exit sentinel in order to capture the suspects. The proposed “pay-as-you-go” traceback model is cost-effective since the investigation may last for just hours with effective traceback techniques. Our experiments demonstrate the feasibility of this new traceback strategy through the cloud.
Keywords :
Internet; computer forensics; social aspects of automation; Amazon EC2 sentinels; Internet criminals; Tor network; cloud computing; cyber crime scene investigations; network forensics; on-demand cyber surveillance sentinels; Bandwidth; Cloud computing; Clouds; Forensics; IP networks; Servers; Cloud Computing; Network Forensics; Sentinels; Tor; Traceback;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on
Conference_Location :
Genova
ISSN :
1545-0678
Print_ISBN :
978-1-4244-7471-4
Type :
conf
DOI :
10.1109/ICDCSW.2010.33
Filename :
5628729
Link To Document :
بازگشت