Internet of things forensic data analysis using machine learning to identify roots of data scavenging

Abstract In this paper, we proposed the blockchain-assisted shared audit framework (BSAF) to analyze digital forensic data in the IoT platform. The proposed framework was designed to detect the source/cause of data scavenging attacks in virtualized resources (VR). The proposed framework implements blockchain technology for access log and control management. Access log information is analyzed for its consistency of adversary event detection using logistic regression (LR) machine learning and cross-validation. An adversary event detected by LR is filtered using cross-validation to retain the precision of data analysis for varying user density and VRs. Experimental results prove the consistency of the proposed method by improving the data analysis, as well as reducing analysis time and the adversary event rate.

[1]  Mauro Conti,et al.  SARA: Secure Asynchronous Remote Attestation for IoT Systems , 2020, IEEE Transactions on Information Forensics and Security.

[2]  Jong Hyuk Park,et al.  A blockchain-based decentralized efficient investigation framework for IoT digital forensics , 2019, The Journal of Supercomputing.

[3]  Tao Qin,et al.  Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems , 2019, IEEE Transactions on Computational Social Systems.

[4]  Claude Roux,et al.  The screening of identity documents at borders for forensic drug intelligence purpose , 2020 .

[5]  Qinghua Zheng,et al.  Towards Efficient Fine-Grained Access Control and Trustworthy Data Processing for Remote Monitoring Services in IoT , 2019, IEEE Transactions on Information Forensics and Security.

[6]  Eoghan Casey,et al.  IoT forensic challenges and opportunities for digital traces , 2019, Digit. Investig..

[7]  Nai-Wei Lo,et al.  FOTB: a secure blockchain-based firmware update framework for IoT environment , 2019, International Journal of Information Security.

[8]  Flora Amato,et al.  A semantic-based methodology for digital forensics analysis , 2020, J. Parallel Distributed Comput..

[9]  Biplab Sikdar,et al.  A GLRT-Based Mechanism for Detecting Relay Misbehavior in Clustered IoT Networks , 2020, IEEE Transactions on Information Forensics and Security.

[10]  Gunasekaran Manogaran,et al.  Wearable IoT Smart-Log Patch: An Edge Computing-Based Bayesian Deep Learning Network System for Multi Access Physical Monitoring System , 2019, Sensors.

[11]  Wenchang Shi,et al.  A Survey on Digital Forensics in Internet of Things , 2020, IEEE Internet of Things Journal.

[12]  Quanyan Zhu,et al.  Modeling, Analysis, and Mitigation of Dynamic Botnet Formation in Wireless IoT Networks , 2018, IEEE Transactions on Information Forensics and Security.

[13]  Xiong Li,et al.  A secure authentication scheme based on elliptic curve cryptography for IoT and cloud servers , 2018, 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).

[14]  Muhammad Naeem Ahmed Khan Multi-agent Based Forensic Analysis Framework for Infrastructures Involving Storage Networks , 2019 .

[15]  Harald Baier,et al.  bring2lite: A Structural Concept and Tool for Forensic Data Analysis and Recovery of Deleted SQLite Records , 2019 .

[16]  A. Biedermann,et al.  Normative decision analysis in forensic science , 2018, Artificial Intelligence and Law.

[17]  Elena Sitnikova,et al.  A new network forensic framework based on deep learning for Internet of Things networks: A particle deep framework , 2020, Future Gener. Comput. Syst..

[18]  Jianfeng Ma,et al.  BTNC: A blockchain based trusted network connection protocol in IoT , 2020, J. Parallel Distributed Comput..

[19]  Stefanos Gritzalis,et al.  A framework for designing cloud forensic-enabled services (CFeS) , 2018, Requirements Engineering.

[20]  Kwok-Yan Lam,et al.  Blockchain-based mechanism for fine-grained authorization in data crowdsourcing , 2020, Future Gener. Comput. Syst..

[21]  Nhien-An Le-Khac,et al.  Forensic analysis of privacy-oriented cryptocurrencies , 2020, Digit. Investig..

[22]  Hai-Cheng Chu,et al.  The Digital Fingerprinting Analysis of Generic Twitter Sessions from Internet of Things Security Aspect , 2019, Mob. Networks Appl..

[23]  Roohie Naaz Mir,et al.  Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer , 2019, Digit. Investig..

[24]  Elena Sitnikova,et al.  Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset , 2018, Future Gener. Comput. Syst..

[25]  K. P. Sridhar,et al.  Classification System for Lung Cancer Nodule Using Machine Learning Technique and CT Images , 2019, 2019 International Conference on Communication and Electronics Systems (ICCES).

[26]  Raphaël Couturier,et al.  DistLog: A distributed logging scheme for IoT forensics , 2020, Ad Hoc Networks.

[27]  Ruben Rios,et al.  Cybersecurity profiles based on human-centric IoT devices , 2019, Human-centric Computing and Information Sciences.

[28]  Mohamed Abdel-Basset,et al.  A Novel Intelligent Medical Decision Support Model Based on Soft Computing and IoT , 2020, IEEE Internet of Things Journal.

[29]  Jongsung Kim,et al.  Forensic analysis for IoT fitness trackers and its application , 2020, Peer-to-Peer Netw. Appl..

[30]  Gholamhossein Ekbatanifard,et al.  An Efficient Forensics Architecture in Software-Defined Networking-IoT Using Blockchain Technology , 2019, IEEE Access.