Three log analysis methods were proposed in this book, to identify, analyze and preserve the potential evidence in a log file. An intrusion detection method based on Bayesian Fuzzy Clustering (BFC) and two levels of Gravitational- Group search based SVNN is proposed to help cloud forensic investigators in identifying potential evidence about an intrusion. A multi-level and mutual log integrity preservation approach using public key infrastructure for cloud forensics is proposed to prevent a criminal or cloud service provider or the forensic investigator himself tampering with the evidence on...
Three log analysis methods were proposed in this book, to identify, analyze and preserve the potential evidence in a log file. An intrusion detection ...