Due to the impact of wireless sensor networks (WSN) on dramatic reduction in computational and energy resources, research on the implications of this type of networks would be considered as a deliberate and update point. One of the main issues in these networks is the security. During transfer of data from source nodes to sink nodes or vice versa, many WSNs require applications to protect data privacy. Besides, computational and energy and memory limitations of WSNs and also defenseless environment that may be applied to them, make the possibility that these types of attacks occur more often. In this study, we provide a design using intelligent multi-agent systems that help us during the crime and after crime occurred to obtain more accurate forensics reports presentable to the court of law. A feature of the design of intelligent multi-agent system is to obtain evidence during crime, without the suspect realizing it; in fact, we can do live acquisitions. The proposed design was raised in WSN networks for first time. The investigation in firewall forensics consists of analyzing and interpreting information related to computer attacks which is contained in firewall log files. But the log files content is generally mysterious and difficult to decode. This paper proposes an intelligent system that automates the firewall forensics process and helps the security administrators to manage, exploit and interpret the firewall log file contents.
[1]
Hong Su.
Dynamic forensics model based on multi-agent
,
2010,
2010 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT).
[2]
Mohamed F. Younis,et al.
Overlapping Multihop Clustering for Wireless Sensor Networks
,
2009,
IEEE Transactions on Parallel and Distributed Systems.
[3]
Randy Frank.
Understanding Smart Sensors
,
1995
.
[4]
B. B. Meshram,et al.
A Monthly Double-blind Peer Reviewed Refereed Open Access International E-journal -included in the International Serial Directories International Journal of Management, It and Engineering Artificial Intelligence Applied to Digital Email for Forensic Application
,
2022
.
[5]
Meena Malik.
Analysis of LEACH Protocol in Wireless Sensor Networks
,
2013
.
[6]
Wendi B. Heinzelman,et al.
Cluster head election techniques for coverage preservation in wireless sensor networks
,
2009,
Ad Hoc Networks.
[7]
Emilio Serrano Fernández,et al.
Ubik: a multi-agent based simulator for ubiquitous computing applications
,
2009
.
[8]
Karim Bouzoubaa,et al.
Ontologies in Amine Platform: Structures and Processes
,
2006,
ICCS.