Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations

被引:24
作者
Yaacoub, Jean-Paul A. [1 ,2 ]
Noura, Hassan N. [1 ]
Salman, Ola [3 ]
Chehab, Ali [3 ]
机构
[1] Univ Bourgogne Franche Comte UBFC, FEMTO ST Inst, CNRS, Belfort, France
[2] Arab Open Univ, Dept Comp Sci, Beirut, Lebanon
[3] Amer Univ Beirut, Dept Elect & Comp Engn, Beirut, Lebanon
关键词
IoT digital-forensics; IoT anti-forensics; Anti-anti-forensics techniques; Counter anti-forensics; Internet of things forensics; Internet of Forensics Things; IoT digital forensics investigation; IoT source of evidences; Protecting and preserving IoT evidences; COMPUTER FORENSICS; BATTLEFIELD THINGS; MEMORY ACQUISITION; NETWORK FORENSICS; BIG DATA; INTERNET; CHALLENGES; INFORMATION; EFFICIENT; TAXONOMY;
D O I
10.1016/j.iot.2022.100544
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the number of cyber attacks against IoT domains has increased tremendously. This resulted into both human and financial losses at all IoT levels especially individual and organization levels. Recently, cyber-criminals have kept on leveraging new skills and capabilities by conducting anti-forensics activities and employing techniques and tools to cover their tracks to evade any possible detection of the attack's events, which has targeted either the IoT system or/and its component(s). Consequently, IoT cyber-attacks are becoming more efficient and more sophisticated with higher risks and threat levels based on their more frequent likelihood to occur and their impact. However, traditional security and forensics solutions are no longer enough to prevent nor investigate such cyber attacks, especially in terms of acquiring evidence for attack investigation. Hence, the need for well-defined, sophisticated, and advanced forensics investigation techniques is highly required to prevent anti-forensics techniques and track down cyber criminals. This paper reviews the different forensics and anti-forensics methods that can be applied in the IoT domain including tools, techniques, types, and challenges, while also discussing the rise of the anti-anti-forensics as a new forensics protection mechanism against anti-forensics activities. This would help forensics investigators to better understand the different anti-forensics tools, methods and techniques that cyber criminals employ while launching their attacks. Moreover, the limitations of the current forensics techniques are discussed, especially in terms of issues and challenges. Finally, this paper presents a holistic view from a literature point of view over the forensics domain in general and for IoT in particular.
引用
收藏
页数:36
相关论文
共 293 条
[1]  
Abad Jorge Benitez, 2018, COMPUTER FORENSICS A
[2]  
Adedayo OM, 2016, 2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF)
[3]  
Afifah Khoirunnisa, 2016, DATA SOFTWARE ENG IC, P1
[4]  
Agrawal R., 2004, P ACM SIGMOD INT C M, P563
[5]  
Al Awawdeh Shadi, 2013, SYSTEMATIC APPROACHE, P1, DOI [10.1109/SADFE.2013.6911539, DOI 10.1109/SADFE.2013.6911539]
[6]  
Al-Hadadi Mubarak, 2013, International Journal of Computer and Electrical Engineering, V5, P576, DOI 10.7763/IJCEE.2013.V5.776
[7]  
Al-Saleh Mohammed, 2013, 2 INT C CYBER SECURI, P189
[8]   Live forensics of software attacks on cyber-physical systems [J].
Al-Sharif, Ziad A. ;
Al-Saleh, Mohammed, I ;
Alawneh, Luay M. ;
Jararweh, Yaser, I ;
Gupta, Brij .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 108 :1217-1229
[9]  
Albano P., 2011, 2011 International Conference on Broadband, Wireless Computing, Communication and Applications, P380, DOI 10.1109/BWCCA.2011.62
[10]  
Alenezi Ahmed, IOT FORENSICS STATE