Forensic Analysis of Docker Swarm Cluster using Grr Rapid Response Framework
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2019, Vol 10, Issue 2
Abstract
An attack on Internet network does not only hap-pened in the web applications that are running natively by a web server under operating system, but also web applications that are running inside container. The currently popular container machines such as Docker is not always secure from Internet attacks which result in disabling servers that are attacked using DoS/DDoS. Therefore, to improve server performance running this web application and provides the application log, DevOps engineer builds advance method by transforming the system into a cluster computers. Currently this method can be easily implemented using Docker Swarm. This research has successfully investigated digital evidence on the log file of containerized web application running on cluster system built by Docker Swarm. This investigation was carried out by using the Grr Rapid Response (GRR) framework.
Authors and Affiliations
Sunardi Sunardi, Imam Riadi, Andi Sugandi
Smart Home Energy Management System Design: A Realistic Autonomous V2H / H2V Hybrid Energy Storage System
The hybrid fuel cell electric vehicle powered by household power during peak use is another opportunity to reduce emissions and save money. For this reason, Vehicle-to-Home (V2H) and Home-to-Vehicle (H2V) systems were pr...
Fuzzy Logic based Approach for VoIP Quality Maintaining
Voice communication is an emerging technology and has great importance in our routine life. Perceptual, Voice over Internet Protocol quality is an important issue for VoIP Apps services because VoIP Apps require real-tim...
Modeling the Cut-off Frequency of Acoustic Signal with an Adaptative Neuro-Fuzzy Inference System (ANFIS)
An Adaptative Neuro-Fuzzy Inference System (ANFIS), new flexible tool, is applied to predict the cut-off frequencies of the symmetric and the anti-symmetric circumferential waves (Si and Ai, i=1,2) propagating around an...
Implementation of a Hierarchical Hybrid Intrusion Detection Mechanism in Wireless Sensors Network
During the last years, Wireless Sensor Networks (WSNs) have attracted considerable attention within the scientific community. The applications based on Wireless Sensor Networks, whose areas include, agriculture, military...
STUDY OF INDIAN BANKS WEBSITES FOR CYBER CRIME SAFETY MECHANSIM
The human society has undergone tremendous changes from time to time with rapid pace at social level from the beginning and technological level ever since the rise of technologies. This technology word changes the human...