A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices

被引:3
|
作者
Kim, Dohyun [1 ]
Pan, Yi [2 ]
Park, Jong Hyuk [3 ]
机构
[1] Catholic Univ Pusan, Dept Comp Engn, Busan 46252, South Korea
[2] Georgia State Univ, Dept Comp Sci, Atlanta, GA 30302 USA
[3] Seoul Natl Univ Sci & Technol SeoulTech, Dept Comp Sci & Engn, Seoul 01811, South Korea
关键词
Malware; Phishing; Computer hacking; Digital forensics; Web pages; Smart phones; Analytical models; IoT security; IoT device forensics; IoT malware; malware investigation; social engineering malware;
D O I
10.1109/ACCESS.2020.3043939
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As IoT devices are always connected to mobile devices or other computing devices via the Internet, clever malwares targeting IoT devices or other computing devices connected to IoT devices are emerging. Therefore, effective IoT security research is needed to respond to hacking attacks by these kinds of malware. This paper studied the method of identifying and analyzing malware combined with social engineering from the perspective of digital forensics. The paper classified and analyzed intelligent malware characteristics and proposed a method of quickly identifying and analyzing the malware that secretly intruded into the devices installed with Android, Linux OS, using digital forensics techniques. Moreover, this paper proved its effectiveness by applying this investigation method to two actual malware cases. The research outcomes will be useful in responding to increasingly clever malware attacking IoT devices.
引用
收藏
页码:224487 / 224499
页数:13
相关论文
共 50 条
  • [31] Raspberry Pi Malware: An Analysis of Cyberattacks Towards IoT Devices
    Martin, Erik David
    Kargaard, Joakim
    Sutherland, Iain
    PROCEEDINGS OF THE 2019 10TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT), 2019, : 161 - 166
  • [32] SIMBIoTA: Similarity-based Malware Detection on IoT Devices
    Tamas, Csongor
    Papp, Dorottya
    Buttyan, Levente
    PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS), 2021, : 58 - 69
  • [33] IoT forensic challenges and opportunities for digital traces
    Servida, Francesco
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2019, 28 : S22 - S29
  • [34] IoT Innovations and Forensic Engineering in the Digital Age
    Parise, Giuseppe
    Mohla, Daleep
    Parise, Luigi
    Lombardi, Mara
    IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, 2021, 57 (03) : 2098 - 2103
  • [35] A Digital Triage Forensics Framework of Window Malware Forensic Toolkit
    Kao, Da-Yu
    Wu, Guan-Jie
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 217 - 222
  • [36] Systematic review of deep learning solutions for malware detection and forensic analysis in IoT
    Qureshi, Siraj Uddin
    He, Jingsha
    Tunio, Saima
    Zhu, Nafei
    Nazir, Ahsan
    Wajahat, Ahsan
    Ullah, Faheem
    Wadud, Abdul
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2024, 36 (08)
  • [37] Comparative analysis on integrated digital forensic tools for digital forensic investigation
    Lee, Jae-ung
    Soh, Woo-young
    6TH INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING 2019 (ICAME 2019), 2020, 834
  • [38] Forensic Malware Identification Using Naive Bayes Method
    Ramadhan, Beno
    Purwanto, Yudha
    Ruriawan, Muhammad Faris
    2020 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY SYSTEMS AND INNOVATION (ICITSI), 2020, : 1 - 7
  • [39] A Concept Forensic Methodology For The Investigation Of IoT Cyberincidents
    Gomez, Juan Manuel Castelo
    Carrillo-Mondejar, Javier
    Roldan-Gomez, Jose
    Martinez, Jose Luis Martinez
    COMPUTER JOURNAL, 2024, 67 (04): : 1324 - 1345
  • [40] Forensic Detection of Timestamp Manipulation for Digital Forensic Investigation
    Oh, Junghoon
    Lee, Sangjin
    Hwang, Hyunuk
    IEEE ACCESS, 2024, 12 : 72544 - 72565