Security Breach and Forensics in Intelligent Systems

被引:2
|
作者
Devi, M. S. Girija [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol DIAT Deemed Univ, Dept Comp Sci Engn, Pune 411025, Maharashtra, India
关键词
Intelligent systems; Security breach; Forensic analysis; Network forensic framework;
D O I
10.1007/978-981-13-1747-7_33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evolving smart environments making use of IoT wares in conjunction with the evolving security threats in these intelligent systems poses several challenges in forensic investigation of security breaches and cyber crimes involving such devices. This paper explores these challenges and emphasizes on the need for enhancing the capabilities of existing tools for forensic analysis. The contribution of this paper is multifold. First, it enlists the potential threats in the world of intelligent systems, and second, it enumerates the challenges to forensic analysis of crimes involving intelligent devices as subject and/or object. Third, it comments on the capability of existing forensic tools to handle the challenges. Fourth, it proposes the required features for a revamped forensic analysis framework for intelligent systems. The study holds the potential to guide a way towards implementation of technical solutions to handle the challenges envisaged in the ever-evolving smart environment's investigations.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [21] Embedded Device Forensics and Security
    Choo, Kim-Kwang Raymond
    Fei, Yunsi
    Xiang, Yang
    Yu, Yu
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [22] Quality standards in the forensics and security
    Lauer, Von Josef
    KRIMINALISTIK, 2008, 62 (06): : 363 - 364
  • [23] Intelligent Internet Computing: Applications and Security Systems
    Park, Jong Hyuk
    Chao, Han-Chief
    Sauveron, Damien
    Xiang, Yang
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (03): : 297 - 298
  • [24] Cyber Security Game for Intelligent Transportation Systems
    Sedjelmaci, Hichem
    Hadji, Makhlouf
    Ansari, Nirwan
    IEEE NETWORK, 2019, 33 (04): : 216 - 222
  • [25] IMAGE DATA PREPARATION FOR INTELLIGENT SECURITY SYSTEMS
    Sheraizin, S.
    Itzikowitz, S.
    2008 IEEE 25TH CONVENTION OF ELECTRICAL AND ELECTRONICS ENGINEERS IN ISRAEL, VOLS 1 AND 2, 2008, : 198 - 202
  • [26] On the Security of Image Manipulation Forensics
    Cao, Gang
    Wang, Yongbin
    Zhao, Yao
    Ni, Rongrong
    Lin, Chunyu
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2015, PT I, 2015, 9314 : 97 - 105
  • [27] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [28] Distributed Intelligent Systems for Network Security Control
    Shili, Mohamed
    Gharsellaoui, Hamza
    Kanzari, Dalel
    ICSOFT-EA: PROCEEDINGS OF THE 11TH INTERNATIONAL JOINT CONFERENCE ON SOFTWARE TECHNOLOGIES - VOL. 1, 2016, : 348 - 352
  • [29] Impact of Security/AAA on Intelligent Transport Systems
    Kiyohito Tokuda
    Wireless Personal Communications, 2002, 22 : 245 - 251
  • [30] Ultra wideband positioning for intelligent security systems
    Gadsby, D.
    Twigg, P.
    Bowring, N.
    Williams, I.
    MEASUREMENT & CONTROL, 2006, 39 (04): : 108 - 113