Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework

The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis es...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Electronics (Basel) 2022-04, Vol.11 (7), p.1126
Hauptverfasser: Mazhar, Muhammad Shoaib, Saleem, Yasir, Almogren, Ahmad, Arshad, Jehangir, Jaffery, Mujtaba Hussain, Rehman, Ateeq Ur, Shafiq, Muhammad, Hamam, Habib
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 7
container_start_page 1126
container_title Electronics (Basel)
container_volume 11
creator Mazhar, Muhammad Shoaib
Saleem, Yasir
Almogren, Ahmad
Arshad, Jehangir
Jaffery, Mujtaba Hussain
Rehman, Ateeq Ur
Shafiq, Muhammad
Hamam, Habib
description The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.
doi_str_mv 10.3390/electronics11071126
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2648990158</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2648990158</sourcerecordid><originalsourceid>FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</originalsourceid><addsrcrecordid>eNptkE9PAjEQxRujiQT5BF6aeIHDav8su-2RoKskEC9wNJtud6qL0GJn0fDtXYWDB-fyXmZ-meQ9Qq45u5VSszvYgG1j8I1FzlnOucjOSE-wXCdaaHH-x1-SAeKadaO5VJL1yEsRInhsLJ14szlggzR4OvMtRA8tDY4u3xr_inQ4C8sRvYfPxgJdYbejC2O7GyRtSE6WDhdiMaJFNFv4CvH9ilw4s0EYnLRPVsXDcvqUzJ8fZ9PJPLFiLNqkspmt8gwqY9LU8dxBJcCxzNR1rTlXQqmU5ZUd58o6C1ALZaRkqdK1sNVYyT65Of7dxfCxB2zLddjHLhCWIuswzfgvJY-UjQExgit3sdmaeCg5K3-qLP-pUn4D-ldpoA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2648990158</pqid></control><display><type>article</type><title>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>MDPI - Multidisciplinary Digital Publishing Institute</source><creator>Mazhar, Muhammad Shoaib ; Saleem, Yasir ; Almogren, Ahmad ; Arshad, Jehangir ; Jaffery, Mujtaba Hussain ; Rehman, Ateeq Ur ; Shafiq, Muhammad ; Hamam, Habib</creator><creatorcontrib>Mazhar, Muhammad Shoaib ; Saleem, Yasir ; Almogren, Ahmad ; Arshad, Jehangir ; Jaffery, Mujtaba Hussain ; Rehman, Ateeq Ur ; Shafiq, Muhammad ; Hamam, Habib</creatorcontrib><description>The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11071126</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Algorithms ; Automation ; Decision trees ; Denial of service attacks ; Forensic sciences ; Internet of Things ; Literature reviews ; Machine learning ; Memory devices ; Security</subject><ispartof>Electronics (Basel), 2022-04, Vol.11 (7), p.1126</ispartof><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</citedby><cites>FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</cites><orcidid>0000-0002-9355-7486 ; 0000-0002-8253-9709 ; 0000-0002-9196-0458 ; 0000-0001-5203-0621 ; 0000-0001-7337-7608 ; 0000-0002-5320-1012</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Mazhar, Muhammad Shoaib</creatorcontrib><creatorcontrib>Saleem, Yasir</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Arshad, Jehangir</creatorcontrib><creatorcontrib>Jaffery, Mujtaba Hussain</creatorcontrib><creatorcontrib>Rehman, Ateeq Ur</creatorcontrib><creatorcontrib>Shafiq, Muhammad</creatorcontrib><creatorcontrib>Hamam, Habib</creatorcontrib><title>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</title><title>Electronics (Basel)</title><description>The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.</description><subject>Algorithms</subject><subject>Automation</subject><subject>Decision trees</subject><subject>Denial of service attacks</subject><subject>Forensic sciences</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Memory devices</subject><subject>Security</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptkE9PAjEQxRujiQT5BF6aeIHDav8su-2RoKskEC9wNJtud6qL0GJn0fDtXYWDB-fyXmZ-meQ9Qq45u5VSszvYgG1j8I1FzlnOucjOSE-wXCdaaHH-x1-SAeKadaO5VJL1yEsRInhsLJ14szlggzR4OvMtRA8tDY4u3xr_inQ4C8sRvYfPxgJdYbejC2O7GyRtSE6WDhdiMaJFNFv4CvH9ilw4s0EYnLRPVsXDcvqUzJ8fZ9PJPLFiLNqkspmt8gwqY9LU8dxBJcCxzNR1rTlXQqmU5ZUd58o6C1ALZaRkqdK1sNVYyT65Of7dxfCxB2zLddjHLhCWIuswzfgvJY-UjQExgit3sdmaeCg5K3-qLP-pUn4D-ldpoA</recordid><startdate>20220402</startdate><enddate>20220402</enddate><creator>Mazhar, Muhammad Shoaib</creator><creator>Saleem, Yasir</creator><creator>Almogren, Ahmad</creator><creator>Arshad, Jehangir</creator><creator>Jaffery, Mujtaba Hussain</creator><creator>Rehman, Ateeq Ur</creator><creator>Shafiq, Muhammad</creator><creator>Hamam, Habib</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-9355-7486</orcidid><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9196-0458</orcidid><orcidid>https://orcid.org/0000-0001-5203-0621</orcidid><orcidid>https://orcid.org/0000-0001-7337-7608</orcidid><orcidid>https://orcid.org/0000-0002-5320-1012</orcidid></search><sort><creationdate>20220402</creationdate><title>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</title><author>Mazhar, Muhammad Shoaib ; Saleem, Yasir ; Almogren, Ahmad ; Arshad, Jehangir ; Jaffery, Mujtaba Hussain ; Rehman, Ateeq Ur ; Shafiq, Muhammad ; Hamam, Habib</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Automation</topic><topic>Decision trees</topic><topic>Denial of service attacks</topic><topic>Forensic sciences</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Memory devices</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mazhar, Muhammad Shoaib</creatorcontrib><creatorcontrib>Saleem, Yasir</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Arshad, Jehangir</creatorcontrib><creatorcontrib>Jaffery, Mujtaba Hussain</creatorcontrib><creatorcontrib>Rehman, Ateeq Ur</creatorcontrib><creatorcontrib>Shafiq, Muhammad</creatorcontrib><creatorcontrib>Hamam, Habib</creatorcontrib><collection>CrossRef</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mazhar, Muhammad Shoaib</au><au>Saleem, Yasir</au><au>Almogren, Ahmad</au><au>Arshad, Jehangir</au><au>Jaffery, Mujtaba Hussain</au><au>Rehman, Ateeq Ur</au><au>Shafiq, Muhammad</au><au>Hamam, Habib</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-04-02</date><risdate>2022</risdate><volume>11</volume><issue>7</issue><spage>1126</spage><pages>1126-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11071126</doi><orcidid>https://orcid.org/0000-0002-9355-7486</orcidid><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9196-0458</orcidid><orcidid>https://orcid.org/0000-0001-5203-0621</orcidid><orcidid>https://orcid.org/0000-0001-7337-7608</orcidid><orcidid>https://orcid.org/0000-0002-5320-1012</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 2079-9292
ispartof Electronics (Basel), 2022-04, Vol.11 (7), p.1126
issn 2079-9292
2079-9292
language eng
recordid cdi_proquest_journals_2648990158
source Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; MDPI - Multidisciplinary Digital Publishing Institute
subjects Algorithms
Automation
Decision trees
Denial of service attacks
Forensic sciences
Internet of Things
Literature reviews
Machine learning
Memory devices
Security
title Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T01%3A29%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forensic%20Analysis%20on%20Internet%20of%20Things%20(IoT)%20Device%20Using%20Machine-to-Machine%20(M2M)%20Framework&rft.jtitle=Electronics%20(Basel)&rft.au=Mazhar,%20Muhammad%20Shoaib&rft.date=2022-04-02&rft.volume=11&rft.issue=7&rft.spage=1126&rft.pages=1126-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11071126&rft_dat=%3Cproquest_cross%3E2648990158%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2648990158&rft_id=info:pmid/&rfr_iscdi=true