Investigating IoT Systems Security Attacks using Network Forensics

被引:0
|
作者
Mishra, Ayushi [1 ]
Bagade, Priyanka [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kanpur, Uttar Pradesh, India
关键词
Network Forensics; IoT; DoS Attack; Threat Model; Investigation; Wireshark; Machine Learning; CHALLENGES; INTERNET; THINGS;
D O I
10.1109/COMSNETS56262.2023.10041322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is driving innovation in various industries by connecting multiple devices to enhance processes and increase efficiency. However, it has also created a massive attack surface, necessitating robust and novel IoT security and forensics solutions. Forensic techniques enable us to comprehend the impact of the security breach on the system and give the scientific evidence required for legal action. IoT systems constitute a network of devices connected wirelessly or through wired channels susceptible to cyber attacks. This paper introduces network forensics, that focuses on analyzing network traffic and monitoring intrusions to investigate and collect data following a security assault. We performed network forensics on a Wi-Fi network compromised by a denial of service (DoS) attack. The attack was developed on the Raspberry Pi, an IoT device configuring the Wi-Fi network. The IoT system under attack was investigated using the Wireshark tool to gather evidence. The generated evidence includes information about deauthentication packets and key re-initiation between the Raspberry Pi and the Wi-Fi network. This research aims to offer IoT system developers a road map for developing a forensics-aware IoT system.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] A Survey on Security Attacks and Solutions in the IoT Network
    Liang, Xingwei
    Kim, Yoohwan
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 853 - 859
  • [2] Mitigation of attacks via improved network security in IOT network environment using RNN
    Yadav, Surendra
    Hashmi, Hina
    Vekariya, Daxa
    N, Zafar Ali Khan
    J, Vijay Fidelis
    Measurement: Sensors, 2024, 32
  • [3] Investigating the Robustness of IoT Security Cameras against Cyber Attacks
    Trabelsi, Zouheir
    2022 5TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2022, : 17 - 23
  • [4] Enhancing the Security of IOT in Forensics
    Banday, Mehroush
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 193 - 198
  • [5] Investigating attacks to improve security and privacy in RFID systems using the security bit method
    Damghani, Hamidreza
    Hosseinian, Heliasadat
    Damghani, Leila
    2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
  • [6] Investigating the Security Issues of Multi-layer IoT Attacks Using Machine Learning Techniques
    Al Sukhni, Badeea
    Dave, Jugal M.
    Manna, Soumya K.
    Zhang, Leishi
    2022 HUMAN-CENTERED COGNITIVE SYSTEMS, HCCS, 2022, : 24 - 32
  • [7] Security Attacks on IoT
    Okul, S.
    Aydin, M. Ali
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 1 - 5
  • [8] Intelligent IoT Systems: security issues, attacks, and countermeasures
    Bekri, Wiem
    Layeb, Taher
    Jmal, Rihab
    Fourati, Lamia Chaari
    2022 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING, IWCMC, 2022, : 231 - 236
  • [9] Network Forensics Analysis of Cyber Attacks on Computer Systems using Machine Learning Techniques
    Yildiz, Firdevs
    Guel, Batuhan
    Ertam, Fatih
    ACTA INFOLOGICA, 2024, 8 (01): : 34 - 50
  • [10] MemInspect: Memory Forensics for investigating Fileless Attacks
    Leng, Tao
    Pan, Yuedong
    Zhao, Lixin
    Yu, Aimin
    Zhu, Ziyuan
    Cai, Lijun
    Meng, Dang
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 946 - 955