Security Breach and Forensics in Intelligent Systems

被引:2
|
作者
Devi, M. S. Girija [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol DIAT Deemed Univ, Dept Comp Sci Engn, Pune 411025, Maharashtra, India
关键词
Intelligent systems; Security breach; Forensic analysis; Network forensic framework;
D O I
10.1007/978-981-13-1747-7_33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evolving smart environments making use of IoT wares in conjunction with the evolving security threats in these intelligent systems poses several challenges in forensic investigation of security breaches and cyber crimes involving such devices. This paper explores these challenges and emphasizes on the need for enhancing the capabilities of existing tools for forensic analysis. The contribution of this paper is multifold. First, it enlists the potential threats in the world of intelligent systems, and second, it enumerates the challenges to forensic analysis of crimes involving intelligent devices as subject and/or object. Third, it comments on the capability of existing forensic tools to handle the challenges. Fourth, it proposes the required features for a revamped forensic analysis framework for intelligent systems. The study holds the potential to guide a way towards implementation of technical solutions to handle the challenges envisaged in the ever-evolving smart environment's investigations.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [1] OCA: An intelligent model for improving security breach of biometric based authentication systems
    Sharma, Sandeep Kumar
    Kumar, Anil
    Ashtagi, Rashmi
    Jain, Rekha
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (05): : 1415 - 1425
  • [2] Digital Forensics to Intelligent Forensics
    Irons, Alastair
    Lallie, Harjinder Singh
    FUTURE INTERNET, 2014, 6 (03): : 584 - 596
  • [3] Security, privacy and forensics in the enterprise information systems
    Gupta, B. B.
    Agrawal, Dharma P.
    ENTERPRISE INFORMATION SYSTEMS, 2021, 15 (04) : 445 - 447
  • [4] Security breach
    Herzenberg, C
    NEW SCIENTIST, 2004, 182 (2448) : 31 - 31
  • [5] Using image analysis systems in forensics and security printing
    Kipman, Y
    Johnson, K
    IS&T'S NIP20: INTERNATIONAL CONFERENCE ON DIGITAL PRINTING TECHNOLOGIES, PROCEEDINGS, 2004, : 318 - 322
  • [6] Disk Forensics of VxWorks File Systems for Aircraft Security
    Mckeon, Stephen
    Roberge, Vincent
    IEEE CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING, 2023, 46 (04): : 278 - 287
  • [7] RFID security breach
    不详
    CONTROL ENGINEERING, 2008, 55 (08) : 49 - 49
  • [8] Investigating IoT Systems Security Attacks using Network Forensics
    Mishra, Ayushi
    Bagade, Priyanka
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [9] Methodology and Challenges in Digital Security Forensics of Wireless Systems and Devices
    Achi, H.
    Hellany, A.
    Nagrial, M.
    2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 283 - 287
  • [10] Information Security and Digital Forensics in the world of Cyber Physical Systems
    Jones, Andrew
    Vidalis, Stilianos
    Abouzakhar, Nasser
    2016 ELEVENTH INTERNATIONAL CONFERENCE ON DIGITAL INFORMATION MANAGEMENT (ICDIM 2016), 2016, : 10 - 14