Full Text

Turn on search term navigation

© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.

Abstract

The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.

Details

Title
Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework
Author
Muhammad Shoaib Mazhar 1 ; Saleem, Yasir 1 ; Almogren, Ahmad 2   VIAFID ORCID Logo  ; Arshad, Jehangir 3   VIAFID ORCID Logo  ; Mujtaba Hussain Jaffery 3   VIAFID ORCID Logo  ; Ateeq Ur Rehman 4   VIAFID ORCID Logo  ; Shafiq, Muhammad 5   VIAFID ORCID Logo  ; Hamam, Habib 6   VIAFID ORCID Logo 

 Department of Computer Engineering, KICS, University of Engineering and Technology (UET) Lahore, Lahore 54000, Pakistan; [email protected] (M.S.M.); [email protected] (Y.S.) 
 Department of Computer Science, College of Computer and Information Sciences, King Saud University, Riyadh 11633, Saudi Arabia; [email protected] 
 Department of Electrical & Computer Engineering, Lahore Campus, COMSATS University Islamabad, Lahore 54000, Pakistan; [email protected] 
 Department of Electrical Engineering, Government College University, Lahore 54000, Pakistan; [email protected] 
 Department of Information and Communication Engineering, Yeungnam University, Gyeongsan 38541, Korea 
 Faculty of Engineering, Université de Moncton, Moncton, NB E1A 3E9, Canada; [email protected]; International Institute of Technology and Management, Libreville BP1989, Gabon; Spectrum of Knowledge Production & Skills Development, Sfax 3027, Tunisia; Department of Electrical and Electronic Engineering Science, School of Electrical Engineering, University of Johannesburg, Johannesburg 2006, South Africa 
First page
1126
Publication year
2022
Publication date
2022
Publisher
MDPI AG
e-ISSN
20799292
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
2648990158
Copyright
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.