Investigating IoT Systems Security Attacks using Network Forensics

被引:0
|
作者
Mishra, Ayushi [1 ]
Bagade, Priyanka [1 ]
机构
[1] Indian Inst Technol, Dept Comp Sci & Engn, Kanpur, Uttar Pradesh, India
关键词
Network Forensics; IoT; DoS Attack; Threat Model; Investigation; Wireshark; Machine Learning; CHALLENGES; INTERNET; THINGS;
D O I
10.1109/COMSNETS56262.2023.10041322
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is driving innovation in various industries by connecting multiple devices to enhance processes and increase efficiency. However, it has also created a massive attack surface, necessitating robust and novel IoT security and forensics solutions. Forensic techniques enable us to comprehend the impact of the security breach on the system and give the scientific evidence required for legal action. IoT systems constitute a network of devices connected wirelessly or through wired channels susceptible to cyber attacks. This paper introduces network forensics, that focuses on analyzing network traffic and monitoring intrusions to investigate and collect data following a security assault. We performed network forensics on a Wi-Fi network compromised by a denial of service (DoS) attack. The attack was developed on the Raspberry Pi, an IoT device configuring the Wi-Fi network. The IoT system under attack was investigated using the Wireshark tool to gather evidence. The generated evidence includes information about deauthentication packets and key re-initiation between the Raspberry Pi and the Wi-Fi network. This research aims to offer IoT system developers a road map for developing a forensics-aware IoT system.
引用
收藏
页数:6
相关论文
共 50 条
  • [31] Revolutionising IoT Network Security By Assessing ML Localisation Techniques Against Jamming Attacks
    Ioannou, Iacovos
    Savva, Michael
    Raspopoulos, Marios
    Christophorou, Christophoros
    Vassiliou, Vasos
    2024 22ND MEDITERRANEAN COMMUNICATION AND COMPUTER NETWORKING CONFERENCE, MEDCOMNET 2024, 2024,
  • [32] A review study on blockchain-based IoT security and forensics
    Kamal, Randa
    Hemdan, Ezz El-Din
    El-Fishway, Nawal
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (30) : 36183 - 36214
  • [33] Security Breach and Forensics in Intelligent Systems
    Devi, M. S. Girija
    Nene, Manisha J.
    INFORMATION AND COMMUNICATION TECHNOLOGY FOR INTELLIGENT SYSTEMS, ICTIS 2018, VOL 2, 2019, 107 : 349 - 360
  • [34] Internet of Things (IoT): Taxonomy of Security Attacks
    Nawir, Mukrimah
    Amir, Amiza
    Yaakob, Naimah
    Lynn, Ong Bi
    2016 3RD INTERNATIONAL CONFERENCE ON ELECTRONIC DESIGN (ICED), 2016, : 321 - 326
  • [35] Embedded IOT System: Software and Security Attacks
    Sabir, Muhammad Ayub
    Malik, Muhammad Sheraz Arshad
    Ashraf, Fatima
    Rasheed, Rubab
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (08): : 70 - 73
  • [36] Evolution of IoT Security: The Era of Smart Attacks
    Bout E.
    Loscri V.
    Gallais A.
    IEEE Internet of Things Magazine, 2022, 5 (01): : 108 - 113
  • [37] IoT Security: A Layered Approach for Attacks & Defenses
    Ahemd, Mian Muhammad
    Shah, Munam Ali
    Wahid, Abdul
    2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 104 - 110
  • [38] IoT based Agriculture (Ag-IoT): A detailed study on Architecture, Security and Forensics
    Rudrakar, Santoshi
    Rughani, Parag
    INFORMATION PROCESSING IN AGRICULTURE, 2024, 11 (04): : 524 - 541
  • [39] Network Security and Types of Attacks in Network
    Pawar, Mohan V.
    Anuradha, J.
    INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONVERGENCE (ICCC 2015), 2015, 48 : 503 - 506
  • [40] Cloud Forensics-A Framework for Investigating Cyber Attacks in Cloud Environment
    Manoj, Sheik Khadar Ahmad
    Bhaskari, D. Lalitha
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL MODELLING AND SECURITY (CMS 2016), 2016, 85 : 149 - 154