Security issues in Sensor Networks and gathering admissible evidence in Network Forensics

The scope of information security is becoming wider everyday due to new and emerging dimensions in the evolution of computer applications with the intention to lessen manual operations. These have necessitated the needs to manufacture portable and smart devices that can be interconnected to the Internet for home and industrial usages and for environmental surveillance. Consequently, global and national regulatory laws and statutes aimed at addressing illegal activities committed across computer and sensor networks are also increasing. Nevertheless, there are incessant cases of abuse through information leakage, masquerading, telephone hacking and password cracking that are perpetrated by some users of these technologies. Thus, this paper critically describes and analyses emerging security challenges in the investigation of smart devices that interface with computer systems. The review will be functionally useful to researchers, vendors, security professionals and IT end users in general.

[1]  Hervé Debar,et al.  Aggregation and Correlation of Intrusion-Detection Alerts , 2001, Recent Advances in Intrusion Detection.

[2]  Marc Dacier,et al.  Mining intrusion detection alarms for actionable knowledge , 2002, KDD.

[3]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[4]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[5]  Ji Hyea Han,et al.  Data Mining : Concepts and Techniques 2 nd Edition Solution Manual , 2005 .

[6]  J. Nehinbe A Method for Investigating Distributed Denial of Service ( DDoS ) Attacks , 2009 .

[7]  Jian Pei,et al.  Data Mining: Concepts and Techniques, 3rd edition , 2006 .

[8]  Joshua Ojo Nehinbe,et al.  Automated Technique for Debugging Network Intrusion Detection Systems , 2010, 2010 International Conference on Intelligent Systems, Modelling and Simulation.

[9]  Joshua Ojo Nehinbe,et al.  Automated Method for Reducing False Positives , 2010, 2010 International Conference on Intelligent Systems, Modelling and Simulation.

[10]  Matt Bishop,et al.  Proceedings of the 42nd Hawaii International Conference on System Sciences- 2009 Digital Forensics: Defining a Research Agenda , 2022 .

[11]  Ali Movaghar-Rahimabadi,et al.  Intrusion Detection: A Survey , 2008, 2008 Third International Conference on Systems and Networks Communications.

[12]  Paul D. Scott,et al.  Evaluating data mining procedures: techniques for generating artificial data sets , 1999, Inf. Softw. Technol..

[13]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[14]  Joshua Ojo Nehinbe,et al.  Critical analyses of alerts swamping and intrusion redundancy , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[15]  Elias Pimenidis,et al.  Computer Anti-forensics Methods and Their Impact on Computer Forensic Investigation , 2009 .