SlideShare a Scribd company logo
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1163
Analysis of Forensics Tools in Cloud Environment
Kajol Vilas Mohite1, Prof. Varshapriya J. N2
1M.Tech Student, Dept. of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
2Associate Professor, Dept. of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India
-----------------------------------------------------------------------------------***-----------------------------------------------------------------------------
Abstract - Computer-forensic tool is been divided into
various different parts like IoT forensic, digital forensic,
network forensic and multimedia forensic. Cloud forensic is
one of which is the combination of digital and network
forensic. There are too many different toolscreatesforcloud
forensic. This tools are the combination of digital and
network forensic tool. Some tools uses base as mobile
forensic detection and some of them uses base as network
interface. Some of them are based on data extraction and
other are based on image extraction from cloud database. In
this paper we are testing different type of forensic tool and
going to examine there performanceonthedifferentcriteria.
This criteria while help to understand the nature of forensic
tool. How the tools detect the attacks on given cloud
environment
Key Words:CloudComputing,Cloud Forensic,Openstack,
AWS, Security, Forensic Tool.
1. INTRODUCTION
The Cloud has been a great influence on many applications
by many different industries. With its popularity, cloud
technologies are still problemunderstandandisopensource
for many research and development. The security of cloud
computing is very critical topic which requires various
additional research. From the forensic perspective,there are
numerous questions which are arise like how to analyze the
Cloud using traditional digital forensics techniques. For
example, during a traditional digital forensic examination, all
files that are storage in media are examined along with the
overall file system structure. However, it cannot be
considered as a practical model for cloud infrastructure, as
the elasticity and ephemerality of pooled storage make
pinpointing data blocks cumbersome. This difficulty is
exacerbated in networked systems by the scale with which
computing resources are spreadoverdiverseadministrative
and geopolitical domains. Cloud is able to combine different
heterogeneous resources (hardwareplatforms,storageback
ends, file systems) that can be on geographicallydistributed.
Cloud Forensic Tool
1) EnCase: EnCase is normally used in criminal
investigations and was named the Best Computer
Forensic Solution for eight consecutive years by SC
Magazine. There is no other solution which offers
the same level of flexibility, functionality and can
track the record of court-acceptance as EnCase
Forensic. EnCase also offers mobile forensics,
investigatorsfindstheflexibilityandconvenienceso
that they can complete their investigations
efficiently and quickly. Encase is also multipurpose
forensic investigation tool.
2) FTK: FTK or Forensic toolkit is useful to scan the
hard drive and looking for evidence. FTK is
developed by Access Data and also has a standalone
module called FTK Imager. It can be used to image
the hard disk, ensuring the integrity of the data
using hashing. It can image the hard disk in a single
file for files in multiple sections, thatarelaterjoined
and gets a reconstructed image as an output.
Investigators can also choose between GUI or
command line as per there convenience. FTK
processes and indexes data upfront, which
eliminates wasted time and waiting for searches to
execute. Doesn’t matter how many different data
sources it is dealing with or the amount of data is to
be cull through, FTK gets you there quicker and
better than anything else. TK while computing uses
distributed processing and it is the only forensics
solution which provides fully leverage multi-
thread/multi-core computers. Where other
forensics tools waste all the potential of modern
hardware solutions, FTK uses all 100 percent of its
hardware resources, helping investigators find
relevant evidence faster.
3) Oxygen Forensics: Oxygen Forensic Suite, it is used
for gather digital evidence from cloud servicesused
on phones and mobile phones. The suite is used to
bypass the Android screen lock, and to get location
history, extract data from cloud storages, analyze
call and data records, search data keywords,
recover deleted data and export data to various file
formats. It supports various mobile platforms
including Blackberry, Android, Sony, and iPhone.
2. RELATED WORK
There are some cloud forensic tools which were examined
such as:
1) FROST: FROST provides the first forensic
capabilities integrated with OpenStack, and to our
knowledge the first to be a built into any
Infrastructure-as-a-Service (IaaS) cloud platform.
Throughout the a paper we use the NIST definition
of cloud computing as a model for an on-demand
access to a pool of resources that it can be as
released with minimal management effort and
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1164
provisioned or a service provider interaction
Consider an cloud customer, Alice, whose provider
uses OpenStack with the FROST. Alice wants to an
investigate an incident of suspiciously-high
bandwidth usage from her cloud hosted webserver.
While her a webserver logs web requests inside of
its a VM, Alice can get am more complete picturesof
a activity by obtaining an record of management
activity and metadata about her VM. Alice uses
FROST to retrieve firewall logs, Nova Compute
Service API logs, and the virtual hard drive image of
an suspicious machine and then provides this a
evidence to the authorities. The firewall logs may
also show a attacker scanning Alices virtual ma-
chine before hacking it. API logs may be contains
evidence of unauthorized attempts to stop a virtual
machine. The disk image may also contain evidence
of what a attacker did once he obtained access. This
is an strong forensic evidence about a potential
crime that can be also used in court. Alice can also
obtain this evidence by using either the an web
management plane or the OpenStack API. FROST
ensures that the forensic integrity of the an
evidence that Alice gathers. Without FROST, the
evidence would only be available with assistance
from Alices cloud provider.
2) SIFT: SANS Investigation forensic toolkit is an VM
that is a preloaded with the a tools required to
perform forensic analysis.Itisperfectforbeginners,
as it saves- tool finding, downloading and
installation time. Based on Ubuntu, SIFT has all the
important tools needed to carry out a detailed
forensic analysis or incident response study. It
supports analysis in advanced forensic format
(AFF), expert witness format (E01) and RAW
evidence (DD) format. It comes with tools to carve
data files, generate timeline from system logs,
examine recycle bins, and much more. SIFT
provides user documentation that allows you toget
accustomed to the available tools and their usage.It
also explains where evidence can be found on a
system. Tools can be opened manually from the
terminal window or with the help of top menu bar.
3. PROPOSED METHOD
AWS-IR
It is an Python command line interface that is automates
initial response actions. It has two built-in commands, key-
compromise and instance-compromise, with some plugin
options. As the name implies, key-compromise disables and
revokes compromised access keys for you. Instance-
compromise isolates the occurrences and preserves forensic
artifacts for your investigation.
Fig -1: Flow Diagram on AWS
Margarita Shotgun
This is another Python command line tool, but this one
allows you to pull memory from oneormoresystemsinyour
AWS environment.
Fig -2: Key Examination
4. EXPERIMENT, EVALUATION AND DISCUSSION
4.1 Algorithm and Cammands
Installation of AWS
$ sudo apt _get update
$ sudo apt _get upgrade
$ sudo apt _get install python −pip
$ python3 −m virtualenv env
$ source/env/bin/activate
$ pip install aws ir
Installation of Margarita
$ git clone https://github.com
/ThreatResponse/margaritashotgun.git
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1165
$ cd margaritashotgun
$ python setup.py sdist
$ pip install dist/margaritashotgun−*.tar.gz
$ margaritashotgun−h
Small Phase of work flow of the tool
Fig -3: Flow of how snapshot is analize
4.2 Factors that lead to test performance:
There are several opportunities that can be leveraged to
advance forensic investigations.
• Cost Effectiveness: It is secure andtheforensic servicescan
be less expensive when they are implemented on a large
scale. Cloud computing is very attractive to small and
medium enterprises because it helps in reducing IT costs.
• Data Abundance: Amazon S3 and Amazon Simple DB
ensure object durability by storing objects multiple times in
multiple availability zones on the initial write.
• Overall Robustness: Some technologies help improve the
overall robustness of cloud forensics. For example, Amazon
S3 automatically generates an MD5 hash when an object is
stored
• Scalability and Flexibility: Cloud computing facilitates the
very flexible and scalable use of resources, which also
applies to forensic services.
• Forensics as a Service: Forensicsasa cloudservicecouldbe
leverage the a massive computing power of the cloud to
support cybercrime investigations at all levels
5. CONCLUSION
This paper shows how to the study of latest forensic tool
used by AWS services. And there architecture that how it
takes snapshot of every instance and verifies whether it is
safe or not. The given tool is just simply taking the
snapshotof every instance also. There are many old cloud
forensic tool which are used which uses encrypted data for
analyzing the system. It uses can be run on hardware as well
as on instances or on built in cloud environment. But the
given tools which this paper is working on is been provided
by Amazon Web Services and are more secure that other
forensic tool.
REFERENCES
[1] Sameera Almulla, Youssef Iraqi,Andrew Jones , “Digital
Forensic of a Cloud Based Snapshot,” IEEE Transl., 978-
1-5090-2000-3, The Sixthen Intenation Conference on
Innovating Computer Technology, INTECH 2016.
[2] Aincent E. Urias, William M.S. Stout, Caleb Loverro,
Hypervisor Assisted Forensics and IncidentResponsein
the Cloud, SAND 2016eng Guo, “An Efficient Protocol
with Bidirectional Verification for Storage Security in
Cloud Computing”, IEEEtransactiononcloudcomputing
May, 2016.
[3] Pragya Jain, Aparna Datt, S.C. Gupta, “Cloud Service
Orchestration based Architecture of OpenStack Nova
and Swift ”, Intl. Conference on Advances in Computing,
Communications and Informatics (ICACCI), 2016
[4] Amna Eleyan,Derar Eleyan, “Forensic Process as a
Service (FPaaS) for Cloud Computing,” IEEET Transl,
European Intelligence and Security Informatics
Conference, IEEE, 2015.
[5] Monali P. Mohite, S. B. Ardhapurkar , “Overcast:
Developing Digital Forensic Tool in Cloud Computing
Environment,” 978-1-4799-6818- 3, IEEE Sponsored
2nd International Conference on Innovations in
Information Embedded and Communication Systems,
ICIIECS’2015.
[6] Josiah Dykstra*, Alan T. Sherman, “Design and
implementation of FROST: Digital forensic tools for the
OpenStack cloud computing
platform,”www.elsevier.com/locate/diin, 10 (2013)
S87S9.
[7] Filipo Sharevski, “Digital ForensicInvestigationinCloud
Computing Environment: Impact on Privacy,” 978-1-
4799-4061-5, IEEE Louisville Chapter,2013 IEEE
[8] “Amazon Web Services. Amazon CloudWatch“
http://aws. Amazon.com/cloudwatch/;, 2013
[9] K.K. Arthur H.S. Venter, “An InvestigationintoComputer
Forensic Tools,“ Information and Computer Security
Architectures (ICSA) Research Group, 2013
[10] Anand Kumar Mishra, Priya Matta,Emmanuel S.Pilliand
R. C. Joshi, “ Cloud Forensics: State-of-the-Art and
Reasearch Challenges, International Symposium on
Cloud and Services Computing 2012
[11] K, Ruan, J. Carthy, T. Kechadi and M. Crosbie, “Cloud
Forensics,“ Advances in Digital Forensics VII - IFIP
Advances in Information and Communication
Technology, Volume 361, pp. 35-46, 2011
[12] Monali P.Mahiteand,Pallavi R.Gulve, “ Quantitative
Analysis of Cloud Based Digital Forensic Tool,”., 2009.

More Related Content

DOCX
Morales-Capstone-IDS.IPS Deployment_revision1
PDF
PPTX
Treat Detection using Hadoop
PDF
Passive monitoring to build Situational Awareness
PDF
IRJET- Adaptable Wildcard Searchable Encryption System
PDF
10th SANS ICS Security Summit Project SHINE Presentation
PPTX
5691 computer network career
PDF
Survey of Clustering Based Detection using IDS Technique
Morales-Capstone-IDS.IPS Deployment_revision1
Treat Detection using Hadoop
Passive monitoring to build Situational Awareness
IRJET- Adaptable Wildcard Searchable Encryption System
10th SANS ICS Security Summit Project SHINE Presentation
5691 computer network career
Survey of Clustering Based Detection using IDS Technique

What's hot (20)

PDF
Iaona handbook for network security - draft rfc 0.4
PDF
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
PDF
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
PDF
Network Security: Experiment of Network Health Analysis At An ISP
PDF
Advance security in cloud computing for military weapons
PDF
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
PDF
Crypto Mechanism to Provide Secure to the IOT Data
PPTX
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
PDF
Effective Data Erasure and Anti Forensics Techniques
PDF
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
PDF
An Extensive Survey of Intrusion Detection Systems
DOC
Project RUGGEDTRAX Findings Report (28-Nov-2015)
PPTX
Cybersecurity - Jim Butterworth
PDF
MSc Dissertation on cloud Deekshant Jeerakun
PDF
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
PDF
IRJET- Machine Learning Processing for Intrusion Detection
PDF
Ics2016 scidmark-27oct2016
PDF
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
PDF
Software Defined Networking Architecture for Empowering Internet of Things & ...
PDF
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
Iaona handbook for network security - draft rfc 0.4
ONDaSCA: On-demand Network Data Set Creation Application for Intrusion Detect...
DDOS ATTACK DETECTION ON INTERNET OF THINGS USING UNSUPERVISED ALGORITHMS
Network Security: Experiment of Network Health Analysis At An ISP
Advance security in cloud computing for military weapons
WLI-FCM and Artificial Neural Network Based Cloud Intrusion Detection System
Crypto Mechanism to Provide Secure to the IOT Data
Cloud-based IDS architectures : APPLYING THE IDS APPROACHES INTO THE CLOUD EN...
Effective Data Erasure and Anti Forensics Techniques
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
An Extensive Survey of Intrusion Detection Systems
Project RUGGEDTRAX Findings Report (28-Nov-2015)
Cybersecurity - Jim Butterworth
MSc Dissertation on cloud Deekshant Jeerakun
System Approach for Single Keyword Search for Encrypted Data Files Guarantees...
IRJET- Machine Learning Processing for Intrusion Detection
Ics2016 scidmark-27oct2016
Splunk .conf2011: Splunk for Fraud and Forensics at Intuit
Software Defined Networking Architecture for Empowering Internet of Things & ...
IRJET- Security Enhance using Hash and Chaostic Algorithm in Cloud
Ad

Similar to IRJET- Analysis of Forensics Tools in Cloud Environment (20)

PDF
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
PDF
Cloud-forensics
PPTX
Digital forensic tools
PDF
Research Paper Digital Forensics on Google Cloud Platform
PDF
The Death Of Computer Forensics: Digital Forensics After the Singularity
PDF
Study of Digital Forensics on Google Cloud Platform
PPTX
OWASP Atlanta 2018: Forensics as a Service
PPTX
SANS Cloud Security Summit 2018: Forensics as a Service
PDF
Cloud Breach - Forensics Audit Planning
PDF
Incident Response Automation @ Netflix Q12019
PPTX
Challenges of Cloud Forensics.pptx
PDF
PPTX
Challenges in Cloud Forensics
DOCX
A log based approach to make digital forensics easier on cloud computing
DOCX
Comparative Study of Digital Forensics Tools.docx
PDF
Challenges and Proposed Solutions for Cloud Forensic
PDF
Review on Computer Forensic
PPT
Cloud Monitoring And Forensic Using Security Metrics
PPT
The Trouble with Cloud Forensics
DOCX
Cyber&digital forensics report
Cloud Forensics: Drawbacks in Current Methodologies and Proposed Solution
Cloud-forensics
Digital forensic tools
Research Paper Digital Forensics on Google Cloud Platform
The Death Of Computer Forensics: Digital Forensics After the Singularity
Study of Digital Forensics on Google Cloud Platform
OWASP Atlanta 2018: Forensics as a Service
SANS Cloud Security Summit 2018: Forensics as a Service
Cloud Breach - Forensics Audit Planning
Incident Response Automation @ Netflix Q12019
Challenges of Cloud Forensics.pptx
Challenges in Cloud Forensics
A log based approach to make digital forensics easier on cloud computing
Comparative Study of Digital Forensics Tools.docx
Challenges and Proposed Solutions for Cloud Forensic
Review on Computer Forensic
Cloud Monitoring And Forensic Using Security Metrics
The Trouble with Cloud Forensics
Cyber&digital forensics report
Ad

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
composite construction of structures.pdf
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
DOCX
573137875-Attendance-Management-System-original
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PPTX
Geodesy 1.pptx...............................................
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PPTX
Construction Project Organization Group 2.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PDF
Well-logging-methods_new................
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPTX
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
UNIT 4 Total Quality Management .pptx
CYBER-CRIMES AND SECURITY A guide to understanding
composite construction of structures.pdf
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Embodied AI: Ushering in the Next Era of Intelligent Systems
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
573137875-Attendance-Management-System-original
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Geodesy 1.pptx...............................................
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Construction Project Organization Group 2.pptx
OOP with Java - Java Introduction (Basics)
Well-logging-methods_new................
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Engineering Ethics, Safety and Environment [Autosaved] (1).pptx

IRJET- Analysis of Forensics Tools in Cloud Environment

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1163 Analysis of Forensics Tools in Cloud Environment Kajol Vilas Mohite1, Prof. Varshapriya J. N2 1M.Tech Student, Dept. of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India 2Associate Professor, Dept. of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra, India -----------------------------------------------------------------------------------***----------------------------------------------------------------------------- Abstract - Computer-forensic tool is been divided into various different parts like IoT forensic, digital forensic, network forensic and multimedia forensic. Cloud forensic is one of which is the combination of digital and network forensic. There are too many different toolscreatesforcloud forensic. This tools are the combination of digital and network forensic tool. Some tools uses base as mobile forensic detection and some of them uses base as network interface. Some of them are based on data extraction and other are based on image extraction from cloud database. In this paper we are testing different type of forensic tool and going to examine there performanceonthedifferentcriteria. This criteria while help to understand the nature of forensic tool. How the tools detect the attacks on given cloud environment Key Words:CloudComputing,Cloud Forensic,Openstack, AWS, Security, Forensic Tool. 1. INTRODUCTION The Cloud has been a great influence on many applications by many different industries. With its popularity, cloud technologies are still problemunderstandandisopensource for many research and development. The security of cloud computing is very critical topic which requires various additional research. From the forensic perspective,there are numerous questions which are arise like how to analyze the Cloud using traditional digital forensics techniques. For example, during a traditional digital forensic examination, all files that are storage in media are examined along with the overall file system structure. However, it cannot be considered as a practical model for cloud infrastructure, as the elasticity and ephemerality of pooled storage make pinpointing data blocks cumbersome. This difficulty is exacerbated in networked systems by the scale with which computing resources are spreadoverdiverseadministrative and geopolitical domains. Cloud is able to combine different heterogeneous resources (hardwareplatforms,storageback ends, file systems) that can be on geographicallydistributed. Cloud Forensic Tool 1) EnCase: EnCase is normally used in criminal investigations and was named the Best Computer Forensic Solution for eight consecutive years by SC Magazine. There is no other solution which offers the same level of flexibility, functionality and can track the record of court-acceptance as EnCase Forensic. EnCase also offers mobile forensics, investigatorsfindstheflexibilityandconvenienceso that they can complete their investigations efficiently and quickly. Encase is also multipurpose forensic investigation tool. 2) FTK: FTK or Forensic toolkit is useful to scan the hard drive and looking for evidence. FTK is developed by Access Data and also has a standalone module called FTK Imager. It can be used to image the hard disk, ensuring the integrity of the data using hashing. It can image the hard disk in a single file for files in multiple sections, thatarelaterjoined and gets a reconstructed image as an output. Investigators can also choose between GUI or command line as per there convenience. FTK processes and indexes data upfront, which eliminates wasted time and waiting for searches to execute. Doesn’t matter how many different data sources it is dealing with or the amount of data is to be cull through, FTK gets you there quicker and better than anything else. TK while computing uses distributed processing and it is the only forensics solution which provides fully leverage multi- thread/multi-core computers. Where other forensics tools waste all the potential of modern hardware solutions, FTK uses all 100 percent of its hardware resources, helping investigators find relevant evidence faster. 3) Oxygen Forensics: Oxygen Forensic Suite, it is used for gather digital evidence from cloud servicesused on phones and mobile phones. The suite is used to bypass the Android screen lock, and to get location history, extract data from cloud storages, analyze call and data records, search data keywords, recover deleted data and export data to various file formats. It supports various mobile platforms including Blackberry, Android, Sony, and iPhone. 2. RELATED WORK There are some cloud forensic tools which were examined such as: 1) FROST: FROST provides the first forensic capabilities integrated with OpenStack, and to our knowledge the first to be a built into any Infrastructure-as-a-Service (IaaS) cloud platform. Throughout the a paper we use the NIST definition of cloud computing as a model for an on-demand access to a pool of resources that it can be as released with minimal management effort and
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1164 provisioned or a service provider interaction Consider an cloud customer, Alice, whose provider uses OpenStack with the FROST. Alice wants to an investigate an incident of suspiciously-high bandwidth usage from her cloud hosted webserver. While her a webserver logs web requests inside of its a VM, Alice can get am more complete picturesof a activity by obtaining an record of management activity and metadata about her VM. Alice uses FROST to retrieve firewall logs, Nova Compute Service API logs, and the virtual hard drive image of an suspicious machine and then provides this a evidence to the authorities. The firewall logs may also show a attacker scanning Alices virtual ma- chine before hacking it. API logs may be contains evidence of unauthorized attempts to stop a virtual machine. The disk image may also contain evidence of what a attacker did once he obtained access. This is an strong forensic evidence about a potential crime that can be also used in court. Alice can also obtain this evidence by using either the an web management plane or the OpenStack API. FROST ensures that the forensic integrity of the an evidence that Alice gathers. Without FROST, the evidence would only be available with assistance from Alices cloud provider. 2) SIFT: SANS Investigation forensic toolkit is an VM that is a preloaded with the a tools required to perform forensic analysis.Itisperfectforbeginners, as it saves- tool finding, downloading and installation time. Based on Ubuntu, SIFT has all the important tools needed to carry out a detailed forensic analysis or incident response study. It supports analysis in advanced forensic format (AFF), expert witness format (E01) and RAW evidence (DD) format. It comes with tools to carve data files, generate timeline from system logs, examine recycle bins, and much more. SIFT provides user documentation that allows you toget accustomed to the available tools and their usage.It also explains where evidence can be found on a system. Tools can be opened manually from the terminal window or with the help of top menu bar. 3. PROPOSED METHOD AWS-IR It is an Python command line interface that is automates initial response actions. It has two built-in commands, key- compromise and instance-compromise, with some plugin options. As the name implies, key-compromise disables and revokes compromised access keys for you. Instance- compromise isolates the occurrences and preserves forensic artifacts for your investigation. Fig -1: Flow Diagram on AWS Margarita Shotgun This is another Python command line tool, but this one allows you to pull memory from oneormoresystemsinyour AWS environment. Fig -2: Key Examination 4. EXPERIMENT, EVALUATION AND DISCUSSION 4.1 Algorithm and Cammands Installation of AWS $ sudo apt _get update $ sudo apt _get upgrade $ sudo apt _get install python −pip $ python3 −m virtualenv env $ source/env/bin/activate $ pip install aws ir Installation of Margarita $ git clone https://github.com /ThreatResponse/margaritashotgun.git
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 07 | July 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 1165 $ cd margaritashotgun $ python setup.py sdist $ pip install dist/margaritashotgun−*.tar.gz $ margaritashotgun−h Small Phase of work flow of the tool Fig -3: Flow of how snapshot is analize 4.2 Factors that lead to test performance: There are several opportunities that can be leveraged to advance forensic investigations. • Cost Effectiveness: It is secure andtheforensic servicescan be less expensive when they are implemented on a large scale. Cloud computing is very attractive to small and medium enterprises because it helps in reducing IT costs. • Data Abundance: Amazon S3 and Amazon Simple DB ensure object durability by storing objects multiple times in multiple availability zones on the initial write. • Overall Robustness: Some technologies help improve the overall robustness of cloud forensics. For example, Amazon S3 automatically generates an MD5 hash when an object is stored • Scalability and Flexibility: Cloud computing facilitates the very flexible and scalable use of resources, which also applies to forensic services. • Forensics as a Service: Forensicsasa cloudservicecouldbe leverage the a massive computing power of the cloud to support cybercrime investigations at all levels 5. CONCLUSION This paper shows how to the study of latest forensic tool used by AWS services. And there architecture that how it takes snapshot of every instance and verifies whether it is safe or not. The given tool is just simply taking the snapshotof every instance also. There are many old cloud forensic tool which are used which uses encrypted data for analyzing the system. It uses can be run on hardware as well as on instances or on built in cloud environment. But the given tools which this paper is working on is been provided by Amazon Web Services and are more secure that other forensic tool. REFERENCES [1] Sameera Almulla, Youssef Iraqi,Andrew Jones , “Digital Forensic of a Cloud Based Snapshot,” IEEE Transl., 978- 1-5090-2000-3, The Sixthen Intenation Conference on Innovating Computer Technology, INTECH 2016. [2] Aincent E. Urias, William M.S. Stout, Caleb Loverro, Hypervisor Assisted Forensics and IncidentResponsein the Cloud, SAND 2016eng Guo, “An Efficient Protocol with Bidirectional Verification for Storage Security in Cloud Computing”, IEEEtransactiononcloudcomputing May, 2016. [3] Pragya Jain, Aparna Datt, S.C. Gupta, “Cloud Service Orchestration based Architecture of OpenStack Nova and Swift ”, Intl. Conference on Advances in Computing, Communications and Informatics (ICACCI), 2016 [4] Amna Eleyan,Derar Eleyan, “Forensic Process as a Service (FPaaS) for Cloud Computing,” IEEET Transl, European Intelligence and Security Informatics Conference, IEEE, 2015. [5] Monali P. Mohite, S. B. Ardhapurkar , “Overcast: Developing Digital Forensic Tool in Cloud Computing Environment,” 978-1-4799-6818- 3, IEEE Sponsored 2nd International Conference on Innovations in Information Embedded and Communication Systems, ICIIECS’2015. [6] Josiah Dykstra*, Alan T. Sherman, “Design and implementation of FROST: Digital forensic tools for the OpenStack cloud computing platform,”www.elsevier.com/locate/diin, 10 (2013) S87S9. [7] Filipo Sharevski, “Digital ForensicInvestigationinCloud Computing Environment: Impact on Privacy,” 978-1- 4799-4061-5, IEEE Louisville Chapter,2013 IEEE [8] “Amazon Web Services. Amazon CloudWatch“ http://aws. Amazon.com/cloudwatch/;, 2013 [9] K.K. Arthur H.S. Venter, “An InvestigationintoComputer Forensic Tools,“ Information and Computer Security Architectures (ICSA) Research Group, 2013 [10] Anand Kumar Mishra, Priya Matta,Emmanuel S.Pilliand R. C. Joshi, “ Cloud Forensics: State-of-the-Art and Reasearch Challenges, International Symposium on Cloud and Services Computing 2012 [11] K, Ruan, J. Carthy, T. Kechadi and M. Crosbie, “Cloud Forensics,“ Advances in Digital Forensics VII - IFIP Advances in Information and Communication Technology, Volume 361, pp. 35-46, 2011 [12] Monali P.Mahiteand,Pallavi R.Gulve, “ Quantitative Analysis of Cloud Based Digital Forensic Tool,”., 2009.