Internet of things devices: digital forensic process and data reduction

被引:3
作者
Montasari, Reza [1 ]
Hill, Richard [1 ]
Montaseri, Farshad
Jahankhani, Hamid [2 ]
Hosseinian-Far, Amin [3 ]
机构
[1] Univ Huddersfield, Dept Comp Sci, Sch Comp & Engn, Queensgate HD1 3DH, England
[2] Northumbria Univ London, 110 Middlesex St, London E1 7HT, England
[3] Univ Northampton, Fac Business & Law, Univ Dr, Northampton NN1 5PH, England
关键词
IoT forensics; digital forensics; data acquisition; big data; process model; digital investigations; computer forensics; formal process; FUTURE;
D O I
10.1504/IJESDF.2020.110676
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid increase in the pervasiveness of digital devices, combined with their heterogeneous nature, has culminated in increasing volumes of diverse data, a.k.a. big data that can become subject to criminal or civil investigations. This growth in big digital forensic data (DFD) has forced digital forensic practitioners (DFPs) to consider seizing a wider range of devices and acquiring larger volumes of data that can be pertinent to the case being investigated. This, in turn, has created an immense backlog of cases for law enforcement agencies worldwide. The method of data reduction by targeted imaging, combined with a robust process model, however, can assist with speeding up the processes of data acquisition and data analysis in IoT device forensic investigations. To this end, we propose an IoT forensic investigation process model, IoT-FIPM, that can facilitate not only the reduction of the evidentiary IoT data, but also a timely acquisition and analysis of this data.
引用
收藏
页码:424 / 436
页数:13
相关论文
共 31 条
[1]  
[Anonymous], 2017, BBC
[2]  
[Anonymous], 2016, OPEN EFFECT REPORT
[3]  
[Anonymous], 2016, P 11 ANN C DIG FOR S
[4]  
[Anonymous], 2012, Computer Forensics
[5]  
Attwood A, 2011, IEEE GLOBE WORK, P399, DOI 10.1109/GLOCOMW.2011.6162479
[6]   The Future of Digital Forensics: Challenges and the Road Ahead [J].
Caviglione, Luca ;
Wendzel, Steffen ;
Mazurczyk, Wojciech .
IEEE SECURITY & PRIVACY, 2017, 15 (06) :12-17
[7]   A Data Exfiltration and Remote Exploitation Attack on Consumer 3D Printers [J].
Do, Quang ;
Martini, Ben ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) :2174-2186
[8]   Forensic feature extraction and cross-drive analysis [J].
Garfinkel, Simson L. .
DIGITAL INVESTIGATION, 2006, SUPPL. (71-81) :S71-S81
[9]  
Gartner, 2015, GARTN 2015 HYP CYCL
[10]  
Hegarty R.C., 2014, P 10 INT NETWORK C I, P163