Skip to main content

Advances, Systems and Applications

Table 9 The STRIDE threats of LogDrive

From: LogDrive: a proactive data collection and analysis framework for time-traveling forensic investigation in IaaS cloud environments

Threat

Attack method

Protection

Anti-forensic attacks

   

type 1

type 2

Spoofing

Pretending someone in VMs

Authentication on guest OS

✓

 

Tampering

Incorrect timestamps

Memory forensics

✓

 
 

Tampering with LogDrive database

Secure audit log

 

✓

Repudiation

Changing a few bits of a file

Similarity digest hash

✓

 
 

Collision attacks

Collision resistant hash algorithm

✓

 
 

Cryptography and steganography

Data recovery tools, memory forensics

✓

 

Information disclosure

Stealing LogDrive database

Protection of TCB

 

✓

Denial of service

Overflowing logs

Throughput control of LogDrive

✓

 

Elevation of privilege

Taking control of LogDrive

Protection of TCB

 

✓