scholarly journals Digital Forensic Investigation For The Internet Of Medical Things (IoMT)

2019 ◽  
Vol 5 (2) ◽  
pp. 1-6 ◽  
Author(s):  
Hamid Jahankhani ◽  

Considering the large number of devices connected to the Internet of Things(IoT), identifying malicious devices for the purpose of “search & seizure” remainsa critical issue for digital investigators. Consequently, the need for techniques that automatically identify malicious devices can speed up the process of digital investigation. However, few conceptual approaches were proposed to identify malicious devices during IoT forensic investigation. To overcome that, a formal approach is proposed to automatically triage and fingerprint IoT Malicious devices with their respective states. It is expected that with the proposed formal approach, investigators can simply identify malicious devices, their states as well as determine the scope of investigation.


Author(s):  
Muhammad Ilyas

The use of the internet has increased significantly over the past couple of years. Access to the internet has become so common that a person without computer knowledge can also use this facility easily. This ease of availability has provided a lot of benefits to society but on the other hand misuse of the internet for personal or corporate benefits is also increasing. To prosecute cybercriminals and make some lawful checks on everyone's digital activities, digital forensic science comes into the light. In this context, we developed a new framework that improves the digital forensic investigation process. This research paper proposes a method in which we can identify the illegal activities and trace the adversaries. We capture the TCP (Transmission Control Protocol) packets from the servers and workstations. This data collected from the TCP log is stored in the database and preprocessed to eliminate redundant data. Furthermore, the database also contains past data. The proposed framework has three major processes collection of TCP packets, storing and preprocessing of collected data in a database, and mining of the pattern through a digital forensic anomaly collection algorithm. For the evaluation of our proposed framework, we have developed a java based application. The results are shown in the form of reports and tables.


Author(s):  
Jiangfeng Sun ◽  
Fazlullah Khan ◽  
Junxia Li ◽  
Mohammad Dahman Alshehri ◽  
Ryan Alturki ◽  
...  

2021 ◽  
Vol 104 ◽  
pp. 102210
Author(s):  
Dongming Sun ◽  
Xiaolu Zhang ◽  
Kim-Kwang Raymond Choo ◽  
Liang Hu ◽  
Feng Wang

Author(s):  
S. Gopikrishnan ◽  
P. Priakanth ◽  
Gautam Srivastava ◽  
Giancarlo Fortino

2020 ◽  
Vol 63 (8) ◽  
pp. 5-5
Author(s):  
Vinton G. Cerf

2019 ◽  
pp. 1-9
Author(s):  
Carlos Ortega-Laurel ◽  
Jacobo Sandoval-Gutierrez ◽  
Juan Lopez-Sauceda ◽  
Adan Fernando Serrano-Orozco

In this paper we collect and observes the existing digital forensic investigation models, which are essentially the application of information systems and communications engineering for forensic purposes. In addition, a review of the federal criminal situation in Mexico is presented (through the revision of the regulations in the Federal Criminal Code), because the Code indirectly describes the reality of what can be prosecuted and admitted as evidence, criminally speaking, with the application of digital forensic investigation models in Mexico. This is due to the significant deficiency in the proposal of digital forensic investigation models, in which there is not enough emphasis on the potential admissibility of the evidence gathered through the models, to give attention to the need to provide “evidence” to Institutions responsible for the impartation of justice, as if doing digital forensic investigation to be a technological issue and not as it really is: a socio-legal-technological issue. Therefore, considering the criminal reality in Mexico, locating the practices of existing models that make sense in accordance with the norm, an abbreviated model is proposed that really helps successful prosecutions.


2018 ◽  
Vol 42 (12) ◽  
Author(s):  
Uzair Iqbal ◽  
Teh Ying Wah ◽  
Muhammad Habib ur Rehman ◽  
Ghulam Mujtaba ◽  
Muhammad Imran ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document