Digital Forensics for Drone Data - Intelligent Clustering Using Self Organising Maps

被引:11
作者
Mekala, Sri Harsha [1 ]
Baig, Zubair [1 ]
机构
[1] Deakin Univ, Geelong, Vic 3216, Australia
来源
FUTURE NETWORK SYSTEMS AND SECURITY, FNSS 2019 | 2019年 / 1113卷
关键词
Drones or unmanned aerial vehicles (UAVs); Threats and cyber crime; Digital forensic analysis; Digital forensic tools;
D O I
10.1007/978-3-030-34353-8_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Drones or unmanned aerial vehicles (UAVs) have been rapidly adopted for a range of applications over the past decade. Considering their capabilities of information acquisition and surveillance for intelligence, and increasing access to the common public, have led to a rise in the threat associated with cyber crime associated with drones, in recent times. In order to mitigate the threats and to prevent cyber-crime, digital forensics on drone data is both critical as well as lacking in terms of efficacy studies. In this paper, we define a digital forensic methodology for analyzing drone data, and we propose a self organizing map (SOM)-based method for aiding such analysis. Experiments were conducted on two images obtained from the CFReDS project, namely, ArduPilot DIY Drone and DJI Phantom 4, with the purpose of producing admissible digital forensic evidence for the court of law, as part of a cyber-crime investigation. We also highlight the individual capabilities of several digital forensic tools based on experiments conducted on drone data.
引用
收藏
页码:172 / 189
页数:18
相关论文
共 18 条
[1]  
[Anonymous], 2009, ACM SIGKDD explorations newsletter, DOI 10.1145/1656274.1656278
[2]  
[Anonymous], 2019, WHAT AR DRON
[3]  
[Anonymous], 2002, International Journal of Digital Evidence, Volume, DOI DOI 10.1109/SADFE.2009.8
[4]  
Barton Thomas Edward Allen, 2017, 2017 Seventh International Conference on Emerging Security Technologies (EST), P91, DOI 10.1109/EST.2017.8090405
[5]  
Baryamureeba V., 2004, DIG FOR RES C
[6]  
Bouafif H, 2018, INT CONF NEW TECHNOL
[7]   Mobile Forensics: Advances, Challenges, and Research Opportunities [J].
Chernyshev, Maxim ;
Zeadally, Sherali ;
Baig, Zubair ;
Woodward, Andrew .
IEEE SECURITY & PRIVACY, 2017, 15 (06) :42-51
[8]  
Fei B, 2006, INT FED INFO PROC, V194, P113
[9]  
Feyereisl J., 2016, ARXIV160801668
[10]  
G ULATA, 2018, J. Nav. Sci. Eng, V14, P32