Nothing Special   »   [go: up one dir, main page]

Skip to main content

Scope of Forensics in Grid Computing – Vision and Perspectives

  • Conference paper
Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops (ISPA 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4331))

  • 403 Accesses

Abstract

Along with the evolution of Grid technology, the need to protect its resources from malicious activities is becoming more and more important. While robust security architecture provides deterrence, there never be a perfect security mechanism. The Grid security teams must be able to tackle the postattack situation and should be able to read the black-box of the events that led to the failure of the security architecture. Moreover, they should be able to collect the fingerprints of the culprits behind the attack so that necessary legal and judicial actions could be taken. It is only possible when the specific nature of the Grid is kept in mind while developing its forensics techniques. Grid is anewer paradigm and still lacks a number of security features. There is no other work in our knowledge that addresses forensics issues of the grid. This vacuum has overwhelmingly motivated us to take some initiative to fill this gap.

His research work is supported by the European Network of Excellence CoreGRID (project reference number 004265). The network aims at strengthening and advancing scientific and technological excellence in the area of Grid and Peer-to-Peer technologies. The CoreGRID webpage is located at www.coregrid.net.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Laurie, B., Digital, A.: Network Forensics. ACM Queue 2(4) (June 2004)

    Google Scholar 

  2. Dixon, P.: An Overview of Computer Forensics. IEEE Potentials Magazine 24(5), 7–10 (2005)

    Article  Google Scholar 

  3. Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)

    Google Scholar 

  4. Tang, Y., Daniels, T.: A Simple Framework for Distributed Forensics. In: IEEE International Conference on Distributed Computing Systems, June 6-10, pp. 163–169 (2005)

    Google Scholar 

  5. Zhang, Y., Paxson, V.: Detecting Stepping Stones. In: USENIX Security Symposium 2000, Denver, Colorado, USA, August 14- 17 (2000)

    Google Scholar 

  6. Wang, X., Reeves, D.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC, USA (October 2003)

    Google Scholar 

  7. Snoeren, A.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking (ToN), 2 10(6), 721–734 (2002)

    Article  Google Scholar 

  8. Al-Duwairi, B., Daniels, T.: Topology based packet marking. In: International Conference on Computer Communications and Networks (ICCCN 2004), October 11-13, pp. 146–151 (2004)

    Google Scholar 

  9. Carter, E.: Intrusion Detection Systems, February 15. Cisco Press (2002)

    Google Scholar 

  10. González, F., Gómez, J., Kaniganti, M., Dasgupta, D.: An Evolutionary Approach to Gener-ate Fuzzy Anomaly Signatures. In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, West Point, New York, USA, June 18-20, pp. 251–259 (2003)

    Google Scholar 

  11. Kaleton, I.: Combination of Misuse and Anomaly Network Intrusion Detection Systems (March 2002)

    Google Scholar 

  12. The SNORT Project , http://www.snort.org

  13. Naughton, T.: Advancing the Science of Forensic Data Management. In: Proceedings of SPIE - Investigative Image Processing II, July 2002, vol. 4709, pp. 60–67 (2002)

    Google Scholar 

  14. Chen, P., Tsai, L., Ying-Chieh, C., Yee, G.: Standardizing the Construction of a Digital Forensics Laboratory. In: International Workshop on Systematic Approaches to Digital Forensic Engineering, November 7-9, pp. 40–47 (2005)

    Google Scholar 

  15. The Eureka-Celtic Project BUGYO (Building Security Assurance in Open Infrastructures), http://projects.celtic-initiative.org/bugyo

  16. Naqvi, S., Riguidel, M.: Quantifiable Security Metrics for Large Scale Heterogeneous Systems. In: International Carnahan Conference on Security Technology, Lexington, Kentucky, USA, October 16-19 (2006)

    Google Scholar 

  17. Martin, W.: Honey Pots and Honey Nets - Security through Deception. SANS Institute Paper, May 25 (2001)

    Google Scholar 

  18. Yang, G., Rong, C., Dai, Y.: A Distributed Honeypot System for Grid Security. In: Proceeding of the Grid and Cooperative Computing 2003 (GCC 2003), Shanghai, China, pp. 1083–1086 (2003)

    Google Scholar 

  19. Naqvi, S., Massonet, P., Arenas, A.: Security Requirements Model for Grid Data Management Systems. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 30–41. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Allcock, W., et al.: GridFTP: Protocol extensions to FTP for the Grid, GGF Document Series GFD.20 (April 2003)

    Google Scholar 

  21. Gordon, L.: Economic Aspects of Information Security in a Netcentric World, SecurE-Biz CxO Security Summit, Washington D.C. USA (2004)

    Google Scholar 

  22. Mizzi, A.: Return on Information Security Investment (January 2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Naqvi, S., Massonet, P., Arenas, A. (2006). Scope of Forensics in Grid Computing – Vision and Perspectives. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_98

Download citation

  • DOI: https://doi.org/10.1007/11942634_98

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49860-5

  • Online ISBN: 978-3-540-49862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics