A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices

被引:3
|
作者
Kim, Dohyun [1 ]
Pan, Yi [2 ]
Park, Jong Hyuk [3 ]
机构
[1] Catholic Univ Pusan, Dept Comp Engn, Busan 46252, South Korea
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
[3] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
关键词
Malware; Phishing; Computer hacking; Digital forensics; Web pages; Smart phones; Analytical models; IoT security; IoT device forensics; IoT malware; malware investigation; social engineering malware;
D O I
10.1109/ACCESS.2020.3043939
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As IoT devices are always connected to mobile devices or other computing devices via the Internet, clever malwares targeting IoT devices or other computing devices connected to IoT devices are emerging. Therefore, effective IoT security research is needed to respond to hacking attacks by these kinds of malware. This paper studied the method of identifying and analyzing malware combined with social engineering from the perspective of digital forensics. The paper classified and analyzed intelligent malware characteristics and proposed a method of quickly identifying and analyzing the malware that secretly intruded into the devices installed with Android, Linux OS, using digital forensics techniques. Moreover, this paper proved its effectiveness by applying this investigation method to two actual malware cases. The research outcomes will be useful in responding to increasingly clever malware attacking IoT devices.
引用
收藏
页码:224487 / 224499
页数:13
相关论文
共 50 条
  • [21] Towards an Integrated Digital Forensic Investigation Framework for an IoT-Based Ecosystem
    Kebande, Victor R.
    Karie, Nickson M.
    Michael, Antonia
    Malapane, Semaka
    Kigwana, Ivans
    Venter, H. S.
    Wario, Ruth D.
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART INTERNET OF THINGS (SMARTIOT 2018), 2018, : 93 - 98
  • [22] Modeling and Analysis of Malware Propagation for IoT Heterogeneous Devices
    Zhu, Xuejin
    Huang, Jie
    Qi, Chunyang
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 3846 - 3857
  • [23] Forensic investigation of small-scale digital devices: a futuristic view
    Iqbal, Farkhund
    Jaffri, Aasia
    Khalid, Zainab
    MacDermott, Aine
    Ali, Qazi Ejaz
    Hung, Patrick C. K.
    FRONTIERS IN COMMUNICATIONS AND NETWORKS, 2023, 4
  • [24] Cloudlet Solution for Digital Forensic Investigation of Multiple Cases of Multiple Devices
    Mthunzi, Siyakha N.
    Benkhelifa, Elhadj
    Jararweh, Yaser
    Al-Ayyoub, Mahmoud
    2017 SECOND INTERNATIONAL CONFERENCE ON FOG AND MOBILE EDGE COMPUTING (FMEC), 2017, : 235 - 240
  • [25] A Scalable Platform for Enabling the Forensic Investigation of Exploited IoT Devices and Their Generated Unsolicited Activities
    Torabi, Sadegh
    Bou-Harb, Elias
    Assi, Chadi
    Debbabi, Mourad
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32 (0S):
  • [26] IoT Forensic: Bridging the Challenges in Digital Forensic and the Internet of Things
    Zulkipli, Nurul Huda Nik
    Alenezi, Ahmed
    Wills, Gary B.
    IOTBDS: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY, 2017, : 315 - 324
  • [27] A Metamodeling Approach for IoT Forensic Investigation
    Saleh, Muhammed
    Othman, Siti Hajar
    Driss, Maha
    Al-dhaqm, Arafat
    Ali, Abdulalem
    Yafooz, Wael M. S.
    Emara, Abdel-Hamid M.
    ELECTRONICS, 2023, 12 (03)
  • [28] A New Approach of Digital Forensic Model for Digital Forensic Investigation
    Ademu, Inikpi O.
    Imafidon, Chris O.
    Preston, David S.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (12) : 175 - 178
  • [29] A Review and Comparative Study of Digital Forensic Investigation Models
    Kyei, Kwaku
    Zavarsky, Pavol
    Lindskog, Dale
    Ruhl, Ron
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2012, 2013, 114 : 314 - 327
  • [30] Sandbox Environment for Real Time Malware Analysis of IoT Devices
    Kachare, Gaurav Pramod
    Choudhary, Gaurav
    Shandilya, Shishir Kumar
    Sihag, Vikas
    COMPUTING SCIENCE, COMMUNICATION AND SECURITY, 2022, 1604 : 169 - 183