|
[1]Mell P. and Grance T., The NIST Definition of Cloud Computing, 2011, NIST Special Publication 800–145. [2]McLellan C. (2017年11月01日),XaaS: Why 'everything' is now a service,線上檢索日期:2018年10月29日,網址:https://www.zdnet.com/article/xaas-why-everything-is-now-a-service/。 [3]魏伊伶(2017年12月21日),雲端服務需求下之資料安全技術發展趨勢,電腦與通訊期刊,172 期。 [4]行政院國家資通安全會報技術服務中心(2018年06月21日),資安威脅趨勢與案例分享,107 第1次政府資通安全防護巡迴研討會,線上檢索日期:2018年10月29日,網址:https://www.nccst.nat.gov.tw/HandoutDetail?lang=zh&seq=1272。 [5]行政院國家資通安全會報技術服務中心(2017年05月18日),資安趨勢與案例宣導V2.1,106 第1次政府資通安全防護巡迴研討會,線上檢索日期:2018年10月29日,網址:https://www.nccst.nat.gov.tw/HandoutDetail?lang=zh&seq=1267。 [6]行政院國家資通安全會報技術服務中心(2016年08月16日),攻擊趨勢與常見攻擊手法,105年網路攻防演練技術研討會議,線上檢索日期:2018年10月29日,網址:https://www.nccst.nat.gov.tw/HandoutDetail?lang=zh&seq=1256。 [7]Sam K.(2017年03月09日),February 28th DDoS Incident Report,Github Engineering,線上檢索日期:2019年2月26日,網址:https://githubengineering.com/ddos-incident-report/。 [8]Pichan A., Lazarescu M., Soh S.T., Cloud forensics Technical challenges,solutions and comparative analysis, Digital Investigation,Volume 13, 2015, pp. 38–57. [9]Edington Alex M. and Kishore R.,Forensics framework for computing cloud, Computers and Electrical Engineering, Volume 60, 2017, pp. 193–205. [10]Kent K., Chevalier S., Grance T., Dang H.,Guide to integrating forensic techniques into incident response, 2006, NIST Special Publication 800–86. [11]Irfan M., Abbas H., Sun Y., Sajid A. and Pasha M., A framework for cloud forensics evidence collection and analysis using security information and event management, Security and Communication Networks, Volume 9, Issue 16, 2016 , pp. 3790–3807. [12]Manoj S.K.A. and Bhaskari D. L., Cloud Forensics-A Framework for Investigating Cyber Attacks in Cloud Environment , Procedia Computer Science, Volume85, 2016, pp. 149–154. [13]Holt L. A. and Hammoudeh M., Cloud Forensics a Technical Approach to Virtual Machine Acquisition, 2013 European Intelligence and Security Informatics Conference, 2013, pp. 227–227. [14]Meera V. , Issac M. M., Balan C., Forensic acquisition and analysis of VMware virtual machine artifacts, 2013 International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013, pp. 255–259. [15]Liu G., Wang L., Zhang S., Xu S. and Zhang L., Memory Dump and Forensic Analysis Based on Virtual Machine, Proceedings of 2014 IEEE International Conference on Mechatronics and Automation, 2014, pp. 1773–1777. [16]Almulla S., Iraqi Y. and Jones A., Digital Forensic of a Cloud Based Snapshot, The Sixth International Conference on Innovative Computing Technology(INTECH 2016), 2016, pp. 724–729. [17]Rani D. R. and Kumari G. G., A framework for detecting anti-forensics in cloud environment, 2016 International Conference onComputing, Communication and Automation (ICCCA), 2016, pp. 1277–1280. [18]Tien C. W., Liao J. W., Chang S. C. and Kuo S. Y., Memory Forensics Using Virtual Machine Introspection for Malware Analysis, 2017 IEEE Conference on Dependable and Secure Computing, 2017, pp. 518–519. [19]Riaz H. and Tahir M. A., Analysis of VMware virtual machine in forensics and anti-forensics paradigm, 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 2018, pp. 1–6. [20]Anu P. and Vimala S., A survey on sniffing attacks on computer networks, 2017 International Conference on Intelligent Computing and Control (I2C2), 2017, pp. 1–5. [21]Mangut H. A., Al-Nemrat A., Benza¨ıd C., Tawil A. H., ARP Cache Poisoning Mitigation and Forensics Investigation, Proceedings of the 2015 IEEE Trustcom/BigDataSE/ISPA, Volume 1, 2015, pp. 1392–1397. [22]Osanaiye O. A., Short Paper: IP spoofing detection for preventing DDoS attack in Cloud Computing, 2015 18th International Conference on Intelligence in Next Generation Networks, 2015, pp. 139–141. [23]Zulkifli M. A., Riadi I. and Prayudi Y., Live Forensics Method for Analysis Denial of Service (DOS) Attack on Routerboard, 2018 International Journal of Computer Applications, Volume 180, Number 35, 2018, pp. 23–30. [24]Wireshark, Wireshark‧Go Deep, 線上檢索日期:2019年2月26日,網址: https://www.wireshark.org. [25]Volatility, Volatility 2.6 Release, The Volatility Foundation - Open Source Memory Forensics|Releases, 線上檢索日期:2019年2月26日,網址:https://www.volatilityfoundation.org/releases. [26]Redline, Redline | Free Security Software | FireEye, 線上檢索日期:2019年2月26日,網址:https://www.fireeye.com/services/freeware/redline.html. [27]Winhex, Winhex 18.9 Download(Free trial), 線上檢索日期:2019年3月3日,網址:https://winhex.software.informer.com/18.9/ [28]LiME, GitHub - 504ensicsLabs/LiME: LiME (formerly DMD), 線上檢索日期:2019年4月20日,網址:https://github.com/504ensicsLabs/LiME [29]LOIC, Low Orbit Ion Cannon, 線上檢索日期:2019年2月26日,網址:https://sourceforge.net/projects/loic [30]Ettercap, Downloads « Ettercap, 線上檢索日期:2019年4月20日,網址:https://www.ettercap-project.org/downloads.html [31]VMware player, VMware Workstation Player | VMware, 線上檢索日期:2019年3月3日,網址:https://www.vmware.com/products/workstation-player.html [32]FreeNAS, FreeNAS Storage Operating System | Open Source - FreeNAS , 線上檢索日期:2019年2月26日,網址:https://freenas.org/
|