Cyber Crime Scene Investigations (C²SI) through Cloud Computing

نویسندگان

  • Xinwen Fu
  • Zhen Ling
  • Wei Yu
  • Junzhou Luo
چکیده

Cloud computing brings opportunities for network forensics tracing Internet criminals in the distributed environment. We may use the new “pay-as-you-go” model of the cloud computing to deploy the on-demand cyber surveillance sentinels and conduct distributed traceback in complicated cyber crime scene investigations. To trace criminals abusing anonymous communication networks such as Tor, law enforcement can deploy high-bandwidth Amazon EC2 sentinels into the Tor network. Some sentinels are configured as Tor entry guards and others work as Tor exits nodes. With the high bandwidth and appropriate number of such sentinels, we can achieve a required probability that a Tor circuit passes through an entry sentinel and an exit sentinel in order to capture the suspects. The proposed “pay-as-you-go” traceback model is cost-effective since the investigation may last for just hours with effective traceback techniques. Our experiments demonstrate the feasibility of this new traceback strategy through the cloud. Keywords-Cloud Computing, Network Forensics, Traceback, Tor, Sentinels

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cyber Forensic Investigation and Exploration on CloudComputing Environment

Cloud service providers are providing more services on demand. Usage of Cloud in IT Industry, Educational Institution, Social network, Medical Field and other business Industry are tremendously increased. This increases the more criminal activity on cloud. There is a need for forensic capabilities which support investigations of crime in cyber cloud. We need better secured model for cloud deplo...

متن کامل

New Model for Cyber Crime Investigation Procedure

In this paper, we presented a new model for cyber crime investigation procedure which is as follows: readiness phase, consulting with profiler, cyber crime classification and investigation priority decision, damaged cyber crime scene investigation, analysis by crime profiler, suspects tracking, injurer cyber crime scene investigation, suspect summon, cyber crime logical reconstruction, writing ...

متن کامل

Digital forensic investigations: a new frontier for Informing Systems

Digital forensic investigators experience a need for support in their everyday struggle to overcome boundary problems associated with cyber crime investigations. Traditional methods are socio-culturally and physically localised and dependent on strict and historically prescriptive political management. The new internet-worked cyber-world creates unprecedented difficulties for digital forensic i...

متن کامل

A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation

Digital forensics is the science of laws and technologies fighting computer crimes. It can be divided into two sub-areas, computer forensics and network forensics. Network forensics is still a frontier area of digital forensics and is the focus of this paper. We propose to classify network forensic investigations into three categories based on when law enforcement officers conduct investigation...

متن کامل

Drug Related Deaths in Tehran, Iran: Toxicological, Death and Crime Scene Investigations

Background: To determine the role of drugs in fatal overdose, analyses were done on samples obtained from autopsy examination and death and crime scene investigations. The aim of this study was to evaluate the usefulness of toxicology analyses of postmortem biological and non-biological samples belonging to a subject in determining the forensic cause of death. Methods: Toxicological analysi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010