Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework
The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis es...
Gespeichert in:
Veröffentlicht in: | Electronics (Basel) 2022-04, Vol.11 (7), p.1126 |
---|---|
Hauptverfasser: | , , , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 7 |
container_start_page | 1126 |
container_title | Electronics (Basel) |
container_volume | 11 |
creator | Mazhar, Muhammad Shoaib Saleem, Yasir Almogren, Ahmad Arshad, Jehangir Jaffery, Mujtaba Hussain Rehman, Ateeq Ur Shafiq, Muhammad Hamam, Habib |
description | The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model. |
doi_str_mv | 10.3390/electronics11071126 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2648990158</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2648990158</sourcerecordid><originalsourceid>FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</originalsourceid><addsrcrecordid>eNptkE9PAjEQxRujiQT5BF6aeIHDav8su-2RoKskEC9wNJtud6qL0GJn0fDtXYWDB-fyXmZ-meQ9Qq45u5VSszvYgG1j8I1FzlnOucjOSE-wXCdaaHH-x1-SAeKadaO5VJL1yEsRInhsLJ14szlggzR4OvMtRA8tDY4u3xr_inQ4C8sRvYfPxgJdYbejC2O7GyRtSE6WDhdiMaJFNFv4CvH9ilw4s0EYnLRPVsXDcvqUzJ8fZ9PJPLFiLNqkspmt8gwqY9LU8dxBJcCxzNR1rTlXQqmU5ZUd58o6C1ALZaRkqdK1sNVYyT65Of7dxfCxB2zLddjHLhCWIuswzfgvJY-UjQExgit3sdmaeCg5K3-qLP-pUn4D-ldpoA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2648990158</pqid></control><display><type>article</type><title>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><source>MDPI - Multidisciplinary Digital Publishing Institute</source><creator>Mazhar, Muhammad Shoaib ; Saleem, Yasir ; Almogren, Ahmad ; Arshad, Jehangir ; Jaffery, Mujtaba Hussain ; Rehman, Ateeq Ur ; Shafiq, Muhammad ; Hamam, Habib</creator><creatorcontrib>Mazhar, Muhammad Shoaib ; Saleem, Yasir ; Almogren, Ahmad ; Arshad, Jehangir ; Jaffery, Mujtaba Hussain ; Rehman, Ateeq Ur ; Shafiq, Muhammad ; Hamam, Habib</creatorcontrib><description>The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.</description><identifier>ISSN: 2079-9292</identifier><identifier>EISSN: 2079-9292</identifier><identifier>DOI: 10.3390/electronics11071126</identifier><language>eng</language><publisher>Basel: MDPI AG</publisher><subject>Algorithms ; Automation ; Decision trees ; Denial of service attacks ; Forensic sciences ; Internet of Things ; Literature reviews ; Machine learning ; Memory devices ; Security</subject><ispartof>Electronics (Basel), 2022-04, Vol.11 (7), p.1126</ispartof><rights>2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</citedby><cites>FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</cites><orcidid>0000-0002-9355-7486 ; 0000-0002-8253-9709 ; 0000-0002-9196-0458 ; 0000-0001-5203-0621 ; 0000-0001-7337-7608 ; 0000-0002-5320-1012</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Mazhar, Muhammad Shoaib</creatorcontrib><creatorcontrib>Saleem, Yasir</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Arshad, Jehangir</creatorcontrib><creatorcontrib>Jaffery, Mujtaba Hussain</creatorcontrib><creatorcontrib>Rehman, Ateeq Ur</creatorcontrib><creatorcontrib>Shafiq, Muhammad</creatorcontrib><creatorcontrib>Hamam, Habib</creatorcontrib><title>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</title><title>Electronics (Basel)</title><description>The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.</description><subject>Algorithms</subject><subject>Automation</subject><subject>Decision trees</subject><subject>Denial of service attacks</subject><subject>Forensic sciences</subject><subject>Internet of Things</subject><subject>Literature reviews</subject><subject>Machine learning</subject><subject>Memory devices</subject><subject>Security</subject><issn>2079-9292</issn><issn>2079-9292</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><sourceid>ABUWG</sourceid><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><recordid>eNptkE9PAjEQxRujiQT5BF6aeIHDav8su-2RoKskEC9wNJtud6qL0GJn0fDtXYWDB-fyXmZ-meQ9Qq45u5VSszvYgG1j8I1FzlnOucjOSE-wXCdaaHH-x1-SAeKadaO5VJL1yEsRInhsLJ14szlggzR4OvMtRA8tDY4u3xr_inQ4C8sRvYfPxgJdYbejC2O7GyRtSE6WDhdiMaJFNFv4CvH9ilw4s0EYnLRPVsXDcvqUzJ8fZ9PJPLFiLNqkspmt8gwqY9LU8dxBJcCxzNR1rTlXQqmU5ZUd58o6C1ALZaRkqdK1sNVYyT65Of7dxfCxB2zLddjHLhCWIuswzfgvJY-UjQExgit3sdmaeCg5K3-qLP-pUn4D-ldpoA</recordid><startdate>20220402</startdate><enddate>20220402</enddate><creator>Mazhar, Muhammad Shoaib</creator><creator>Saleem, Yasir</creator><creator>Almogren, Ahmad</creator><creator>Arshad, Jehangir</creator><creator>Jaffery, Mujtaba Hussain</creator><creator>Rehman, Ateeq Ur</creator><creator>Shafiq, Muhammad</creator><creator>Hamam, Habib</creator><general>MDPI AG</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SP</scope><scope>8FD</scope><scope>8FE</scope><scope>8FG</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>COVID</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L7M</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><orcidid>https://orcid.org/0000-0002-9355-7486</orcidid><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9196-0458</orcidid><orcidid>https://orcid.org/0000-0001-5203-0621</orcidid><orcidid>https://orcid.org/0000-0001-7337-7608</orcidid><orcidid>https://orcid.org/0000-0002-5320-1012</orcidid></search><sort><creationdate>20220402</creationdate><title>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</title><author>Mazhar, Muhammad Shoaib ; Saleem, Yasir ; Almogren, Ahmad ; Arshad, Jehangir ; Jaffery, Mujtaba Hussain ; Rehman, Ateeq Ur ; Shafiq, Muhammad ; Hamam, Habib</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c252t-bc6cb76ebaa44f17feb2ef06addd9118288407bc578cfceed28a330489d2cb583</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Algorithms</topic><topic>Automation</topic><topic>Decision trees</topic><topic>Denial of service attacks</topic><topic>Forensic sciences</topic><topic>Internet of Things</topic><topic>Literature reviews</topic><topic>Machine learning</topic><topic>Memory devices</topic><topic>Security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mazhar, Muhammad Shoaib</creatorcontrib><creatorcontrib>Saleem, Yasir</creatorcontrib><creatorcontrib>Almogren, Ahmad</creatorcontrib><creatorcontrib>Arshad, Jehangir</creatorcontrib><creatorcontrib>Jaffery, Mujtaba Hussain</creatorcontrib><creatorcontrib>Rehman, Ateeq Ur</creatorcontrib><creatorcontrib>Shafiq, Muhammad</creatorcontrib><creatorcontrib>Hamam, Habib</creatorcontrib><collection>CrossRef</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>Coronavirus Research Database</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Access via ProQuest (Open Access)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><jtitle>Electronics (Basel)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mazhar, Muhammad Shoaib</au><au>Saleem, Yasir</au><au>Almogren, Ahmad</au><au>Arshad, Jehangir</au><au>Jaffery, Mujtaba Hussain</au><au>Rehman, Ateeq Ur</au><au>Shafiq, Muhammad</au><au>Hamam, Habib</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework</atitle><jtitle>Electronics (Basel)</jtitle><date>2022-04-02</date><risdate>2022</risdate><volume>11</volume><issue>7</issue><spage>1126</spage><pages>1126-</pages><issn>2079-9292</issn><eissn>2079-9292</eissn><abstract>The versatility of IoT devices increases the probability of continuous attacks on them. The low processing power and low memory of IoT devices have made it difficult for security analysts to keep records of various attacks performed on these devices during forensic analysis. The forensic analysis estimates how much damage has been done to the devices due to various attacks. In this paper, we have proposed an intelligent forensic analysis mechanism that automatically detects the attack performed on IoT devices using a machine-to-machine (M2M) framework. Further, the M2M framework has been developed using different forensic analysis tools and machine learning to detect the type of attacks. Additionally, the problem of an evidence acquisition (attack on IoT devices) has been resolved by introducing a third-party logging server. Forensic analysis is also performed on logs using forensic server (security onion) to determine the effect and nature of the attacks. The proposed framework incorporates different machine learning (ML) algorithms for the automatic detection of attacks. The performance of these models is measured in terms of accuracy, precision, recall, and F1 score. The results indicate that the decision tree algorithm shows the optimum performance as compared to the other algorithms. Moreover, comprehensive performance analysis and results presented validate the proposed model.</abstract><cop>Basel</cop><pub>MDPI AG</pub><doi>10.3390/electronics11071126</doi><orcidid>https://orcid.org/0000-0002-9355-7486</orcidid><orcidid>https://orcid.org/0000-0002-8253-9709</orcidid><orcidid>https://orcid.org/0000-0002-9196-0458</orcidid><orcidid>https://orcid.org/0000-0001-5203-0621</orcidid><orcidid>https://orcid.org/0000-0001-7337-7608</orcidid><orcidid>https://orcid.org/0000-0002-5320-1012</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2079-9292 |
ispartof | Electronics (Basel), 2022-04, Vol.11 (7), p.1126 |
issn | 2079-9292 2079-9292 |
language | eng |
recordid | cdi_proquest_journals_2648990158 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals; MDPI - Multidisciplinary Digital Publishing Institute |
subjects | Algorithms Automation Decision trees Denial of service attacks Forensic sciences Internet of Things Literature reviews Machine learning Memory devices Security |
title | Forensic Analysis on Internet of Things (IoT) Device Using Machine-to-Machine (M2M) Framework |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-19T01%3A29%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Forensic%20Analysis%20on%20Internet%20of%20Things%20(IoT)%20Device%20Using%20Machine-to-Machine%20(M2M)%20Framework&rft.jtitle=Electronics%20(Basel)&rft.au=Mazhar,%20Muhammad%20Shoaib&rft.date=2022-04-02&rft.volume=11&rft.issue=7&rft.spage=1126&rft.pages=1126-&rft.issn=2079-9292&rft.eissn=2079-9292&rft_id=info:doi/10.3390/electronics11071126&rft_dat=%3Cproquest_cross%3E2648990158%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2648990158&rft_id=info:pmid/&rfr_iscdi=true |