Security Breach and Forensics in Intelligent Systems

被引:2
|
作者
Devi, M. S. Girija [1 ]
Nene, Manisha J. [1 ]
机构
[1] Def Inst Adv Technol DIAT Deemed Univ, Dept Comp Sci Engn, Pune 411025, Maharashtra, India
关键词
Intelligent systems; Security breach; Forensic analysis; Network forensic framework;
D O I
10.1007/978-981-13-1747-7_33
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Evolving smart environments making use of IoT wares in conjunction with the evolving security threats in these intelligent systems poses several challenges in forensic investigation of security breaches and cyber crimes involving such devices. This paper explores these challenges and emphasizes on the need for enhancing the capabilities of existing tools for forensic analysis. The contribution of this paper is multifold. First, it enlists the potential threats in the world of intelligent systems, and second, it enumerates the challenges to forensic analysis of crimes involving intelligent devices as subject and/or object. Third, it comments on the capability of existing forensic tools to handle the challenges. Fourth, it proposes the required features for a revamped forensic analysis framework for intelligent systems. The study holds the potential to guide a way towards implementation of technical solutions to handle the challenges envisaged in the ever-evolving smart environment's investigations.
引用
收藏
页码:349 / 360
页数:12
相关论文
共 50 条
  • [41] Research on Metaverse Security and Forensics
    Liang, Guangjun
    Xin, Jianfang
    Wang, Qun
    Ni, Xueli
    Guo, Xiangmin
    Chen, Pu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 799 - 825
  • [42] IT security forensics: Promises and shortcomings
    Malek, Manu
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS17 - IS17
  • [43] Currency security and forensics: a survey
    J. Chambers
    W. Yan
    A. Garhwal
    M. Kankanhalli
    Multimedia Tools and Applications, 2015, 74 : 4013 - 4043
  • [44] Florida bank suffers security breach
    Schultz, E
    COMPUTERS & SECURITY, 2002, 21 (04) : 299 - 299
  • [45] The Analysis and Countermeasures on Security Breach of Bitcoin
    Lim, Il-Kwon
    Kim, Young-Hyuk
    Lee, Jae-Gwang
    Lee, Jae-Pil
    Nam-Gung, Hyun
    Lee, Jae-Kwang
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2014, PT IV, 2014, 8582 : 720 - 732
  • [46] Developments in Data Security Breach Liability
    Silverman, David L.
    BUSINESS LAWYER, 2014, 70 (01): : 231 - 245
  • [47] Teaching case security breach at target
    Plachkinova, Miloslava
    Maurer, Chris
    Journal of Information Systems Education, 2018, 29 (01) : 11 - 20
  • [48] On SolarWinds Orion Platform Security Breach
    Sterle, Lindsay
    Bhunia, Suman
    2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 636 - 641
  • [49] Developments in Data Security Breach Liability
    Black, John
    BUSINESS LAWYER, 2013, 69 (01): : 199 - 207
  • [50] KSC security breach shows vulnerabilities
    Anon
    Aviation Week and Space Technology (New York), 2001, 155 (03):