Virtual sensor forensics

Sensorial escalation, heterogeneity, pervasiveness, and increased connectivity have created a haven for cyber-criminals, where potential attacks are being exacerbated on a daily basis. In essence, most automated systems are not built to be able to dynamically detect potential security incidents or to provide digital forensic evidence that could be used for forensic hypothesis formation. Consequently, several ISO standards have also been proposed, however, they present a very generic view on investigation. Notably, in the recent past, sensorial proliferation has seen the increased usage of virtual sensors that have extended the functionalities and utilization of physical sensors-where sensing can be done using an abstraction/logical layers, which allows streamed sensor data to be collected dynamically in a proactive approach. The usage of virtual sensors has proved to be threat driven and the vulnerable threat landscape keeps being exploited. In this position paper, the author proposes a Virtual Sensor Forensic (VSF) architecture that may accurately give insights on event response processes, as a reactive technique. The proposed VSF architecture has dimensions that are application-specific, which shows that during the collection of streamed sensor data, post-event response may be of importance towards the detection of potential security incidents. The effort that has been put across in this position has presented the agenda of virtual sensor forensics based on a novel approach, that can be used as a post-event mechanism with a degree of acceptability.

[1]  Peter Stephenson Analysis and Correlation , 2002 .

[2]  Tommy Chin,et al.  A Forensic Methodology for Software-Defined Network Switches , 2017, IFIP Int. Conf. Digital Forensics.

[3]  A. K. Sharma,et al.  Wireless Sensor Network Security Research and Challenges: A Backdrop , 2011, HPAGC.

[4]  Indrakshi Ray,et al.  A Generic Digital Forensic Investigation Framework for Internet of Things (IoT) , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[5]  Madoka Yuriyama,et al.  Sensor-Cloud Infrastructure - Physical Sensor Management with Virtualized Sensors on Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[6]  Kim-Kwang Raymond Choo,et al.  Forensic-by-Design Framework for Cyber-Physical Cloud Systems , 2016, IEEE Cloud Computing.

[7]  Saeed Khorashadizadeh,et al.  Generic 5G Infrastructure for IoT Ecosystem , 2019, IRICT.

[8]  Shukor Abd Razak,et al.  Towards the Development of an Integrated Incident Response Model for Database Forensic Investigation Field , 2020, IEEE Access.

[9]  Victor R. Kebande,et al.  Novel digital forensic readiness technique in the cloud environment , 2018 .

[10]  Victor R. Kebande,et al.  Internet of Threats Introspection in Dynamic Intelligent Virtual Sensing , 2020, CPSS@IOT.

[11]  Kevin Fu,et al.  Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving , 2019, CCS.

[12]  Kim-Kwang Raymond Choo,et al.  Categorization and Organization of Database Forensic Investigation Processes , 2020, IEEE Access.

[13]  Diane J. Cook Making Sense of Sensor Data , 2007, IEEE Pervasive Computing.

[14]  Chintan Patel,et al.  Cross-level Detection of Sensor-based Deception Attacks on Cyber-Physical Systems , 2017, 2017 IEEE 7th Annual International Conference on CYBER Technology in Automation, Control, and Intelligent Systems (CYBER).

[15]  Shukor Abd Razak,et al.  Polychronicity tendency-based online behavioral signature , 2019, Int. J. Mach. Learn. Cybern..

[16]  Xiaoping Chen,et al.  Ontology Based Object Categorization for Robots , 2005, PAKM.

[17]  Hein S. Venter,et al.  Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet? , 2019, Digit. Investig..

[18]  Kim-Kwang Raymond Choo,et al.  On the importance of standardising the process of generating digital forensic reports , 2019, Forensic Science International: Reports.