Investigating IoT Systems Security Attacks using Network Forensics

被引:0
|
作者
Mishra, Ayushi [1 ]
Bagade, Priyanka [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kanpur, Uttar Pradesh, India
关键词
Network Forensics; IoT; DoS Attack; Threat Model; Investigation; Wireshark; Machine Learning; CHALLENGES; INTERNET; THINGS;
D O I
10.1109/COMSNETS56262.2023.10041322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is driving innovation in various industries by connecting multiple devices to enhance processes and increase efficiency. However, it has also created a massive attack surface, necessitating robust and novel IoT security and forensics solutions. Forensic techniques enable us to comprehend the impact of the security breach on the system and give the scientific evidence required for legal action. IoT systems constitute a network of devices connected wirelessly or through wired channels susceptible to cyber attacks. This paper introduces network forensics, that focuses on analyzing network traffic and monitoring intrusions to investigate and collect data following a security assault. We performed network forensics on a Wi-Fi network compromised by a denial of service (DoS) attack. The attack was developed on the Raspberry Pi, an IoT device configuring the Wi-Fi network. The IoT system under attack was investigated using the Wireshark tool to gather evidence. The generated evidence includes information about deauthentication packets and key re-initiation between the Raspberry Pi and the Wi-Fi network. This research aims to offer IoT system developers a road map for developing a forensics-aware IoT system.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Adversarial Attacks Against Network Intrusion Detection in IoT Systems
    Qiu, Han
    Dong, Tian
    Zhang, Tianwei
    Lu, Jialiang
    Memmi, Gerard
    Qiu, Meikang
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (13) : 10327 - 10335
  • [22] Security Against Network Attacks in Supervisory Control Systems
    Lima, Public M.
    Alves, Marcos V. S.
    Carvalho, Lilian K.
    Moreira, Marcos V.
    IFAC PAPERSONLINE, 2017, 50 (01): : 12333 - 12338
  • [23] Sapphire: Using network gateways for IoT security
    Giura, Paul
    Jim, Trevor
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT'18), 2018,
  • [24] Evidence gathering for network security and forensics
    Divakaran, Dinil Mon
    Fok, Kar Wai
    Nevat, Ido
    Thing, Vrizlynn L. L.
    DIGITAL INVESTIGATION, 2017, 20 : S56 - S65
  • [25] IoT Security Attacks Using Reverse Engineering Methods On WSN Applications
    Tellez, Mauricio
    El-Tawab, Samy
    Heydari, M. Hossain
    2016 IEEE 3RD WORLD FORUM ON INTERNET OF THINGS (WF-IOT), 2016, : 182 - 187
  • [26] Investigating Privacy and Security of LinkedIn Via Forensics Analysis
    Ghafarian, Ahmad
    Sosa, Flavio
    INTELLIGENT COMPUTING, VOL 4, 2024, 2024, 1019 : 365 - 376
  • [27] Network Security Problems and Security Attacks
    Gandhi, Komal
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 3855 - 3857
  • [28] Detecting Network Attacks using Federated Learning for IoT Devices
    Shahid, Osama
    Mothukuri, Viraaji
    Pouriyeh, Seyedamin
    Parizi, Reza M.
    Shahriar, Hossain
    2021 IEEE 29TH INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP 2021), 2021,
  • [29] Hybrid Deep Neural Network Model for Detection of Security Attacks in IoT Enabled Environment
    Sagu, Amit
    Gill, Nasib Singh
    Gulia, Preeti
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (01) : 120 - 127
  • [30] A review study on blockchain-based IoT security and forensics
    Randa Kamal
    Ezz El-Din Hemdan
    Nawal El-Fishway
    Multimedia Tools and Applications, 2021, 80 : 36183 - 36214