scholarly journals Investigation Methodology of a Virtual Desktop Infrastructure for IoT

2015 ◽  
Vol 2015 ◽  
pp. 1-10 ◽  
Author(s):  
Doowon Jeong ◽  
Jungheum Park ◽  
Sangjin Lee ◽  
Chulhoon Kang

Cloud computing for IoT (Internet of Things) has exhibited the greatest growth in the IT market in the recent past and this trend is expected to continue. Many companies are adopting a virtual desktop infrastructure (VDI) for private cloud computing to reduce costs and enhance the efficiency of their servers. As a VDI is widely used, threats of cyber terror and invasion are also increasing. To minimize the damage, response procedure for cyber intrusion on a VDI should be systematized. Therefore, we propose an investigation methodology for VDI solutions in this paper. Here we focus on a virtual desktop infrastructure and introduce various desktop virtualization solutions that are widely used, such as VMware, Citrix, and Microsoft. In addition, we verify the integrity of the data acquired in order that the result of our proposed methodology is acceptable as evidence in a court of law. During the experiment, we observed an error: one of the commonly used digital forensic tools failed to mount a dynamically allocated virtual disk properly.

2014 ◽  
Vol 1 (1) ◽  
pp. 14-22
Author(s):  
Ghiri Basuki Putra

Cloud computing telah menjadi hal yang menarik untuk dibahas dikarenakan perkembangannya yang begitu pesat sejak pertama kali diperkenalkan mulai tahun 2000. Pemanfaatan cloud computing kepada penyimpanan data, pemakaian software secara bersama- sama serta penggunaan infrastruktur dan hardware pada jaringan atau komputer yang tergabung dalam sebuah cloud computing. Dengan cloud computing diharapkan adanya efesiensi dan kemudahan dalam  sumber daya baik software, data maupun hardware agar dapat digunakan bersama – sama. Perancangan cloud computing untuk laboratorium komputer Teknik Elektro Universitas Bangka Belitung bertujuan sebagai rancangan awal untuk pengembangan laboratorium komputer serta sebagai pusat pembelajaran dan penelitian cloud computing bagi mahasiswa Teknik Elektro. Perancangan cloud computing ini menggunakan metode Software as a Service (SaaS) dimana SaaS adalah layanan dari Cloud Computing dimana memakai software (perangkat lunak) yang telah disediakan sehingga tidak perlu setiap komputer di laboratorium menginstall software yang diperlukan selama tersedia di layanan Cloud Computing. Rancangan cloud computing di laboratorium menggunakan Private Cloud Computing merupakan pemodelan Cloud Computing yang memberikan lingkup yang lebih kecil untuk dapat memberikan layanan kepada pengguna tertentu misalnya pada sebuah jaringan komputer  lokal maupun pada skala perusahaan kecil maupun menengah.


The distributed computing is the buzz in recent past, cloud computing stands first in this category. This is since, the users can adapt anything related to data storage, magnificent computing facilities on a system with less infrastructure from anywhere at any time. On other dimension such public and private cloud computing strategies would also attracts the foul players to perform intrusion practices. This is since, the comfortability that the cloud platform providing to end users intends them to adapt these services in regard to save or compute the sensitive data. The scope of vulnerability to breach the data or services over cloud computing is more frequent and easier, which is since, these services relies on internet protocol. In this regard, the research in intrusion detection defense mechanisms is having prominent scope. This manuscript, projecting a novel intrusion detection mechanism called "calibration factors-based intrusion detection (CFID)" for cloud computing networks. The experimental study portrayed the significant scope of the proposal CFID to detect the intrusion activities listed as remoteto-Local, Port Scanning, and Virtual-Machine-Trapping.


Sign in / Sign up

Export Citation Format

Share Document