scholarly journals Common Investigation Process Model for Internet of Things Forensics

Author(s):  
Muhammed Ahmed Saleh ◽  
Siti Hajar Othman ◽  
Arafat Al-Dhaqm ◽  
Mahmoud Ahmad Al-Khasawneh
Electronics ◽  
2021 ◽  
Vol 10 (15) ◽  
pp. 1798
Author(s):  
Stephen Dankwa ◽  
Lu Yang

The Internet of Things environment (e.g., smart phones, smart televisions, and smart watches) ensures that the end user experience is easy, by connecting lives on web services via the internet. Integrating Internet of Things devices poses ethical risks related to data security, privacy, reliability and management, data mining, and knowledge exchange. An adversarial machine learning attack is a good practice to adopt, to strengthen the security of text-based CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), to withstand against malicious attacks from computer hackers, to protect Internet of Things devices and the end user’s privacy. The goal of this current study is to perform security vulnerability verification on adversarial text-based CAPTCHA, based on attacker–defender scenarios. Therefore, this study proposed computation-efficient deep learning with a mixed batch adversarial generation process model, which attempted to break the transferability attack, and mitigate the problem of catastrophic forgetting in the context of adversarial attack defense. After performing K-fold cross-validation, experimental results showed that the proposed defense model achieved mean accuracies in the range of 82–84% among three gradient-based adversarial attack datasets.


2016 ◽  
Vol 78 (6-11) ◽  
Author(s):  
Arafat Al-Dhaqm ◽  
Shukor Abd Razak ◽  
Siti Hajar Othman ◽  
Asri Nagdi ◽  
Abdulalem Ali

Database Forensic investigation is a domain which deals with database contents and their metadata to reveal malicious activities on database systems. Even though it is still new, but due to the overwhelming challenges and issues in the domain, this makes database forensic become a fast growing and much sought after research area. Based on observations made, we found that database forensic suffers from having a common standard which could unify knowledge of the domain. Therefore, through this paper, we present the use of Design Science Research (DSR) as a research methodology to develop a Generic Database Forensic Investigation Process Model (DBFIPM). From the creation of DBFIPM, five common forensic investigation processes have been proposed namely, the i) identification, ii) collection, iii) preservation, iv) analysis and v) presentation process. From the DBFIPM, it allows the reconciliation of concepts and terminologies of all common databases forensic investigation processes. Thus, this will potentially facilitate the sharing of knowledge on database forensic investigation among domain stakeholders.  


2021 ◽  
Vol 26 (3) ◽  
pp. 319-327
Author(s):  
Jayakrishnan Anilakkad Raman ◽  
Vasanthi Varadharajan

With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a comprehensive preventive cyber forensic process model with honeypots for the digital IoT investigation process which is formal, that can assist in the court of law in defining the reliability of the investigative process. One year data of various attacks to the IoT network has been recorded by the honeypots for this study. The newly derived model HIM has been validated using various methods and instead of converging on a particular aspect of investigation, it details the entire lifecycle of IoT forensic investigation. The model is targeted to address the forensic analysts’ requirements and the need of legal fraternity for a forensic model. The process model follows a preventive method which reduce further attacks on network.


Kybernetes ◽  
2019 ◽  
Vol 49 (10) ◽  
pp. 2509-2520
Author(s):  
Ibrahim Mashal ◽  
Osama Alsaryrah

Purpose Nowadays, there are various internet of things (IoT) applications covering many aspects of daily life. Many people own numerous smart objects that use these IoT applications. The purpose of this study is determining suitable IoT applications for each user which is a relevant challenge because it is amulti-criteria decision-making. Design/methodology/approach To solve this challenge, the authors propose fuzzy analytical hierarchy process model. Based on the opinions of IoT experts, the model and the hierarchy were designed to assess and compare three crucial IoT criteria, namely, object, application and providers. Findings The results indicated that the application criterion is far more relevant for users other than the two criteria. The findings of this study offer insights into more effective decision-making for IoT application developers and providers. Originality/value This study contributes to the IoT through proposing a fuzzy model to classify IoT applications. The findings provide meaningful implications for IoT application providers.


Author(s):  
Bashar Alohali

Forensics is a science that deals with using scientific principles in order to aid an investigation of a civil or criminal crime. It is a system of procedures that allow an investigator to use as much resources as possible in order to come up with a conclusion for an investigation. Since forensics is a very general term that encompasses an investigation process using scientific knowledge, one can separate a system of investigation based on how it is conducted. This chapter introduces of internet of things (IoT) forensics, IoT application in forensics field. Art-of-states for IoT forensics are provided. The issues for IoT forensics are identified. Also, we have introduced the proposed data classification in Iot forensics protocol. At the end of this chapter, we point out a brief summary and conclusion.


2020 ◽  
Vol 13 (9) ◽  
pp. 123
Author(s):  
Sunti Sopapradit ◽  
Pallop Piriyasurawong

The research was conducted to study and develop a Green University using Cloud based Internet of Things model for energy saving. The aims of this study were 1) to study and design 2) to evaluate a model of Green University using Cloud based Internet of Things for energy saving. There are two phases of the research method. The first phase included the model design: 1) to study, analyze, and synthesize the contents, 2) to develop a process model of Green University using Cloud based Internet of Things, 3) to present the constructed model, and 4) to conclude the results. The second phase is referred to an evaluation of the model. Nine experts from Green University’s Electrical, Information Technology, and university management team were included in the research as sample group. Then, the data were analyzed by standard deviations and means. The model development process has 3 components that include 10 procedures. This model helps to energy saving. As the overall model was shown at a very good level, the experts agreed.


The Industrial Internet-of-Things (IIoT) have changed the present world and future technology-based Industry 4.0, however the understanding of Industrial Internet of things (IIoT) has turned out to be big challenge as far as security concern. The main purpose of adopting and going with new technologies will bring new challenges with cybersecurity and will have more expose uncertain vulnerabilities in terms of AI and BI applications and usage with forensic investigation and accuracy of information sharing between smart devices. This paper composed on the utilization of Artificial Intelligence in securing required evidence for forensic investigation process. The legal methods are different as per region and industry, but the back-frame work and case-based thinking are similar. This framework is made from Intelligence systems such as AI and BI too dependent on the digital information from cloud server. The information from Business Intelligence (BI) and Artificial Intelligence (AI) intersects with data on cloud-based server requires more secure network process and firewall to prevent cyber intruders. This paper has discovered a few gaps on security issues and vulnerabilities where as it will cater proper IIoT based procedure for the Digital Forensic Investigation process.


Sign in / Sign up

Export Citation Format

Share Document