Abstract
Along with the evolution of Grid technology, the need to protect its resources from malicious activities is becoming more and more important. While robust security architecture provides deterrence, there never be a perfect security mechanism. The Grid security teams must be able to tackle the postattack situation and should be able to read the black-box of the events that led to the failure of the security architecture. Moreover, they should be able to collect the fingerprints of the culprits behind the attack so that necessary legal and judicial actions could be taken. It is only possible when the specific nature of the Grid is kept in mind while developing its forensics techniques. Grid is anewer paradigm and still lacks a number of security features. There is no other work in our knowledge that addresses forensics issues of the grid. This vacuum has overwhelmingly motivated us to take some initiative to fill this gap.
His research work is supported by the European Network of Excellence CoreGRID (project reference number 004265). The network aims at strengthening and advancing scientific and technological excellence in the area of Grid and Peer-to-Peer technologies. The CoreGRID webpage is located at www.coregrid.net.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Laurie, B., Digital, A.: Network Forensics. ACM Queue 2(4) (June 2004)
Dixon, P.: An Overview of Computer Forensics. IEEE Potentials Magazine 24(5), 7–10 (2005)
Foster, I., Kesselman, C.: The Grid: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, San Francisco (1999)
Tang, Y., Daniels, T.: A Simple Framework for Distributed Forensics. In: IEEE International Conference on Distributed Computing Systems, June 6-10, pp. 163–169 (2005)
Zhang, Y., Paxson, V.: Detecting Stepping Stones. In: USENIX Security Symposium 2000, Denver, Colorado, USA, August 14- 17 (2000)
Wang, X., Reeves, D.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS 2003), Washington DC, USA (October 2003)
Snoeren, A.: Single-Packet IP Traceback. IEEE/ACM Transactions on Networking (ToN), 2 10(6), 721–734 (2002)
Al-Duwairi, B., Daniels, T.: Topology based packet marking. In: International Conference on Computer Communications and Networks (ICCCN 2004), October 11-13, pp. 146–151 (2004)
Carter, E.: Intrusion Detection Systems, February 15. Cisco Press (2002)
González, F., Gómez, J., Kaniganti, M., Dasgupta, D.: An Evolutionary Approach to Gener-ate Fuzzy Anomaly Signatures. In: IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, West Point, New York, USA, June 18-20, pp. 251–259 (2003)
Kaleton, I.: Combination of Misuse and Anomaly Network Intrusion Detection Systems (March 2002)
The SNORT Project , http://www.snort.org
Naughton, T.: Advancing the Science of Forensic Data Management. In: Proceedings of SPIE - Investigative Image Processing II, July 2002, vol. 4709, pp. 60–67 (2002)
Chen, P., Tsai, L., Ying-Chieh, C., Yee, G.: Standardizing the Construction of a Digital Forensics Laboratory. In: International Workshop on Systematic Approaches to Digital Forensic Engineering, November 7-9, pp. 40–47 (2005)
The Eureka-Celtic Project BUGYO (Building Security Assurance in Open Infrastructures), http://projects.celtic-initiative.org/bugyo
Naqvi, S., Riguidel, M.: Quantifiable Security Metrics for Large Scale Heterogeneous Systems. In: International Carnahan Conference on Security Technology, Lexington, Kentucky, USA, October 16-19 (2006)
Martin, W.: Honey Pots and Honey Nets - Security through Deception. SANS Institute Paper, May 25 (2001)
Yang, G., Rong, C., Dai, Y.: A Distributed Honeypot System for Grid Security. In: Proceeding of the Grid and Cooperative Computing 2003 (GCC 2003), Shanghai, China, pp. 1083–1086 (2003)
Naqvi, S., Massonet, P., Arenas, A.: Security Requirements Model for Grid Data Management Systems. In: López, J. (ed.) CRITIS 2006. LNCS, vol. 4347, pp. 30–41. Springer, Heidelberg (2006)
Allcock, W., et al.: GridFTP: Protocol extensions to FTP for the Grid, GGF Document Series GFD.20 (April 2003)
Gordon, L.: Economic Aspects of Information Security in a Netcentric World, SecurE-Biz CxO Security Summit, Washington D.C. USA (2004)
Mizzi, A.: Return on Information Security Investment (January 2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Naqvi, S., Massonet, P., Arenas, A. (2006). Scope of Forensics in Grid Computing – Vision and Perspectives. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_98
Download citation
DOI: https://doi.org/10.1007/11942634_98
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-49860-5
Online ISBN: 978-3-540-49862-9
eBook Packages: Computer ScienceComputer Science (R0)