Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis

Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Omar Adil Mahdi, Abdelmuttlib Ibrahim Abdallaahmed, Muhammad Shiraz, Yusor Rafid Bahar Al-Mayouf, Ziar Khan, Kwangman Ko, Muhammad Khurram Khan (+1 others)
2016 IEEE Access  
In recent years, the migration of the computational workload to computational clouds has attracted intruders to target and exploit cloud networks internally and externally. The investigation of such hazardous network attacks in the cloud network requires comprehensive network forensics methods (NFM) to identify the source of the attack. However, cloud computing lacks NFM to identify the network attacks that affect various cloud resources by disseminating through cloud networks. In this paper,
more » ... s. In this paper, the study is motivated by the need to find the applicability of current (C-NFMs) for cloud networks of the cloud computing. The applicability is evaluated based on strengths, weaknesses, opportunities, and threats (SWOT) to outlook the cloud network. To the best of our knowledge, no research to date has been conducted to assist network forensics investigators and cloud service providers in finding an optimal method for investigation of network vulnerabilities found in cloud networks. To this end and in this paper, the state-of-the-art C-NFMs are classified and analyzed based on the cloud network perspective using SWOT analysis. It implies that C-NFMs have a suitable impact on cloud network, which further requires for reformation to ensure its applicability in cloud networks. INDEX TERMS Cloud investigation, network forensics, SWOT analysis, cloud networks. I. INTRODUCTION The technological advancements in communication and network have emerged as distributed, integrated, and virtualized resources to assist users with additional computing and storage resources in the form of cloud computing [1]. Cloud computing is the fastest growing distributed computational platform in enterprises, industries, academics, and research community today [2] . In general, cloud computing is a connected resource through various distributed networks [3] . The network is a crucial part in cloud computing by providing quality of service such as ensuring the time constraints [4] and without it, cloud computing is unable to integrate various computation and storage resources [5] . Such quality is considered one of the main features of cloud computing to transparently execute user applications and send its result back [6] . The network plays two important roles in cloud computing which are connecting the user application to the appropriate resource on the cloud [7] and sending the output to the user when the application is executed. Nevertheless, the significance of networks in cloud computing has drawn intruders to attack cloud networks through malicious attacks [8]-[10] such as illegal access, insertion of malicious code, modification of packets, eavesdropping and sending invalid packets. These malicious attacks will affect the user applications and cloud resources to delay the execution process of the entire cloud computing application. 9800 2169-3536
doi:10.1109/access.2016.2631543 fatcat:vqsuwx4hdvcy7ogfsw3woernzq