Skip to main content

Security Breach and Forensics in Intelligent Systems

  • Conference paper
  • First Online:
Information and Communication Technology for Intelligent Systems

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 107))

Abstract

Evolving smart environments making use of IoT wares in conjunction with the evolving security threats in these intelligent systems poses several challenges in forensic investigation of security breaches and cyber crimes involving such devices. This paper explores these challenges and emphasizes on the need for enhancing the capabilities of existing tools for forensic analysis. The contribution of this paper is multifold. First, it enlists the potential threats in the world of intelligent systems, and second, it enumerates the challenges to forensic analysis of crimes involving intelligent devices as subject and/or object. Third, it comments on the capability of existing forensic tools to handle the challenges. Fourth, it proposes the required features for a revamped forensic analysis framework for intelligent systems. The study holds the potential to guide a way towards implementation of technical solutions to handle the challenges envisaged in the ever-evolving smart environment’s investigations.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Blame the internet of things for destroying the internet today, Motherboard, 22 Oct 2016. https://motherboard.vice.com/en_us/article/vv7xg9/blame-the-internet-of-things-for-destroying-the-internet-today

  2. Breaking down mirai: an IoT DDoS Botnet analysis, Incapsula, 10 Oct 2016. https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html

  3. Almeida, A.J., Nene, M.J.: Need for securing networked embedded devices: a survey. In: IEEE International Conference on Computing and Communication Technologies (ICCCT’15), India, Chennai, pp. 37–42, 26–27 Feb 2015

    Google Scholar 

  4. Rao, R.G., Nene, M.J.: SEDoS-7: a proactive mitigation approach against EDoS attacks in cloud computing. In: 2017 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), Chennai, India, pp. 965–970 (2017). https://doi.org/10.1109/WiSPNET.2017.8299905

  5. Latif, R., Abbas, H., Assar, S., Ali, Q.: Cloud computing risk assessment: a systematic literature review. In: Park, J., Stojmenovic, I., Choi, M., Xhafa, F. (eds). Future Information Technology. Lecture Notes in Electrical Engineering, vol. 276. Springer, Berlin, Heidelberg (2014). https://doi.org/10.1007/978-3-642-40861-8-2

  6. Naveen Kumar, K., Nene, M.J.: Chip-based key distribution technique. In: Smart Computing and Informatics. Smart Innovation, Systems and Technologies, vol. 78. Springer, Singapore (2018). https://doi.org/10.1007/978-981-10-5547-8_31

    Google Scholar 

  7. International Data Corporation (IDC) Reveals Worldwide Internet of Things Predictions for 2015: Futurescape for Internet of Things. https://www.idc.com/getdoc.jsp?containerId=prUS25291514

  8. Hossain, M.M., Fotouhi, M., Hasan, R.: Towards an analysis of security issues, challenges, and open problems in the Internet of Things. In: IEEE World Congress on Services, New York, 21–28 (2015). https://doi.org/10.1109/SERVICES.2015.12

  9. Oriwoh, E., Jazani, D., Epiphaniou, G., Sant, P.: Internet of Things forensics: challenges and approaches. In: 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, pp. 608–615 (2013). https://doi.org/10.4108/icst.collaboratecom.2013.254159

  10. Watson, S., Dehghantanha, A.: Digital forensics: the missing piece of the Internet of Things promise. Comput. Fraud Secur. (Elsevier) 2016(6), 5–8, ISSN 1361-3723. https://doi.org/10.1016/S1361-3723(15)30045-2

    Article  Google Scholar 

  11. Spiekermann, D., Eggendorfer, T.: Towards digital investigation in virtual networks: a study of challenges and open problems. In: 11th International Conference on Availability, Reliability and Security (ARES), Salzburg, pp. 406–413 (2016). https://doi.org/10.1109/ARES.2016.34

  12. Karyda, M., Mitrou, L.: Internet forensics: legal and technical issues. In: Second International Workshop on Digital Forensics and Incident Analysis (WDFIA) 2007, Samos, pp. 3–12 (2007). https://doi.org/10.1109/WDFIA.2007.4299368

  13. Reilly, D., Wren, C., Berry, T.: Cloud computing: forensic challenges for law enforcement. In: International Conference for Internet Technology and Secured Transactions, London, pp. 1–7 (2010)

    Google Scholar 

  14. Birk, D., Wegener, C.: Technical issues of forensic investigations in cloud computing environments. In: Sixth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, Oakland, CA, pp. 1–10 (2011). https://doi.org/10.1109/SADFE.2011.17

  15. Teing, Y.-Y., Dehghantanha, A., Choo, K.-K.R., Yang, L.T.: Forensic investigation of P2P cloud storage services and backbone for IoT networks: BitTorrent sync as a case study. Comput. Electr. Eng. 58, 350–363 (2017). https://doi.org/10.1016/j.compeleceng.2016.08.020

    Article  Google Scholar 

  16. https://www.guidancesoftware.com/encase-forensic

  17. https://accessdata.com/products-services/forensic-toolkit-ftk

  18. https://www.sleuthkit.org/

  19. https://www.fireeye.com/services/freeware/memoryze.html

  20. https://www.logicube.com

  21. http://www.microsoft.com:80/industry/government/solutions/cofee/default.aspx

  22. https://www.wireshark.org/

  23. https://www.niksun.com/product.php?id=112

  24. http://www.netresec.com/?page=NetworkMiner

  25. http://www.netresec.com/?page=CapLoader

  26. http://sectools.org/tool/ettercap/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. S. Girija Devi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Girija Devi, M.S., Nene, M.J. (2019). Security Breach and Forensics in Intelligent Systems. In: Satapathy, S., Joshi, A. (eds) Information and Communication Technology for Intelligent Systems . Smart Innovation, Systems and Technologies, vol 107. Springer, Singapore. https://doi.org/10.1007/978-981-13-1747-7_33

Download citation

Publish with us

Policies and ethics