Abstract
Evolving smart environments making use of IoT wares in conjunction with the evolving security threats in these intelligent systems poses several challenges in forensic investigation of security breaches and cyber crimes involving such devices. This paper explores these challenges and emphasizes on the need for enhancing the capabilities of existing tools for forensic analysis. The contribution of this paper is multifold. First, it enlists the potential threats in the world of intelligent systems, and second, it enumerates the challenges to forensic analysis of crimes involving intelligent devices as subject and/or object. Third, it comments on the capability of existing forensic tools to handle the challenges. Fourth, it proposes the required features for a revamped forensic analysis framework for intelligent systems. The study holds the potential to guide a way towards implementation of technical solutions to handle the challenges envisaged in the ever-evolving smart environment’s investigations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Blame the internet of things for destroying the internet today, Motherboard, 22 Oct 2016. https://motherboard.vice.com/en_us/article/vv7xg9/blame-the-internet-of-things-for-destroying-the-internet-today
Breaking down mirai: an IoT DDoS Botnet analysis, Incapsula, 10 Oct 2016. https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html
Almeida, A.J., Nene, M.J.: Need for securing networked embedded devices: a survey. In: IEEE International Conference on Computing and Communication Technologies (ICCCT’15), India, Chennai, pp. 37–42, 26–27 Feb 2015
Rao, R.G., Nene, M.J.: SEDoS-7: a proactive mitigation approach against EDoS attacks in cloud computing. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, pp. 965–970 (2017). https://doi.org/10.1109/WiSPNET.2017.8299905
Latif, R., Abbas, H., Assar, S., Ali, Q.: Cloud computing risk assessment: a systematic literature review. In: Park, J., Stojmenovic, I., Choi, M., Xhafa, F. (eds). Future Information Technology. Lecture Notes in Electrical Engineering, vol. 276. Springer, Berlin, Heidelberg (2014). https://doi.org/10.1007/978-3-642-40861-8-2
Naveen Kumar, K., Nene, M.J.: Chip-based key distribution technique. In: Smart Computing and Informatics. Smart Innovation, Systems and Technologies, vol. 78. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-5547-8_31
International Data Corporation (IDC) Reveals Worldwide Internet of Things Predictions for 2015: Futurescape for Internet of Things. https://www.idc.com/getdoc.jsp?containerId=prUS25291514
Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: IEEE World Congress on Services, New York, 21–28 (2015). https://doi.org/10.1109/SERVICES.2015.12
Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of Things forensics: challenges and approaches. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, pp. 608–615 (2013). https://doi.org/10.4108/icst.collaboratecom.2013.254159
Watson, S., Dehghantanha, A.: Digital forensics: the missing piece of the Internet of Things promise. Comput. Fraud Secur. (Elsevier) 2016(6), 5–8, ISSN 1361-3723. https://doi.org/10.1016/S1361-3723(15)30045-2
Spiekermann, D., Eggendorfer, T.: Towards digital investigation in virtual networks: a study of challenges and open problems. In: 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, pp. 406–413 (2016). https://doi.org/10.1109/ARES.2016.34
Karyda, M., Mitrou, L.: Internet forensics: legal and technical issues. In: Second International Workshop on Digital Forensics and Incident Analysis (WDFIA) 2007, Samos, pp. 3–12 (2007). https://doi.org/10.1109/WDFIA.2007.4299368
Reilly, D., Wren, C., Berry, T.: Cloud computing: forensic challenges for law enforcement. In: International Conference for Internet Technology and Secured Transactions, London, pp. 1–7 (2010)
Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, pp. 1–10 (2011). https://doi.org/10.1109/SADFE.2011.17
Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R., Yang, L.T.: Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent sync as a case study. Comput. Electr. Eng. 58, 350–363 (2017). https://doi.org/10.1016/j.compeleceng.2016.08.020
https://accessdata.com/products-services/forensic-toolkit-ftk
http://www.microsoft.com:80/industry/government/solutions/cofee/default.aspx
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Girija Devi, M.S., Nene, M.J. (2019). Security Breach and Forensics in Intelligent Systems. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 107. Springer, Singapore. https://doi.org/10.1007/978-981-13-1747-7_33
Download citation
DOI: https://doi.org/10.1007/978-981-13-1747-7_33
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1746-0
Online ISBN: 978-981-13-1747-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)