Container and VM Visualization for Rapid Forensic Analysis
dc.contributor.author | Shropshire, Jordan | |
dc.contributor.author | Benton, Ryan | |
dc.date.accessioned | 2020-01-04T08:30:43Z | |
dc.date.available | 2020-01-04T08:30:43Z | |
dc.date.issued | 2020-01-07 | |
dc.description.abstract | Cloud-hosted software such as virtual machines and containers are notoriously difficult to access, observe, and inspect during ongoing security events. This research describes a new, out-of-band forensic tool for rapidly analyzing cloud based software. The proposed tool renders two-dimensional visualizations of container contents and virtual machine disk images. The visualizations can be used to identify container / VM contents, pinpoint instances of embedded malware, and find modified code. The proposed new forensic tool is compared against other forensic tools in a double-blind experiment. The results confirm the utility of the proposed tool. Implications and future research directions are also described. | |
dc.format.extent | 10 pages | |
dc.identifier.doi | 10.24251/HICSS.2020.783 | |
dc.identifier.isbn | 978-0-9981331-3-3 | |
dc.identifier.uri | http://hdl.handle.net/10125/64525 | |
dc.language.iso | eng | |
dc.relation.ispartof | Proceedings of the 53rd Hawaii International Conference on System Sciences | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.subject | Cybersecurity Investigations and Digital Forensics | |
dc.subject | cloud | |
dc.subject | container | |
dc.subject | digital forensics | |
dc.subject | virtual machine | |
dc.title | Container and VM Visualization for Rapid Forensic Analysis | |
dc.type | Conference Paper | |
dc.type.dcmi | Text |
Files
Original bundle
1 - 1 of 1