Cybercrime Investigations in the Era of Smart Applications: Way Forward Through Big Data

The omnipresence of smart devices in many aspects of modern everyday life has helped to achieve an enormous level of automation, has ensured sustainable development, and improved quality of life. Over the last decade, such small and portable devices became cheap and easy to deploy in any kind of application. With the full range of versatile connectivity, such technological development also brings multiple challenges related to the security of infrastructure and data. Many individuals, companies, and states worldwide experience the previously unseen scale and scope of the attacks using novel approaches. All these smart applications have also increased the overall attack surface leading to multiple attack vectors available through vulnerabilities. Lack of standards, insufficient security awareness, and new technological landscape does not help either. Considering this, one needs to enhance forensics investigation methodologies, employ novel tools, combine threat intelligence, and integrate forensic readiness. Such measures will help to reduce the total cyber risk through a high level of preparedness for anticipated data-driven crimes in smart applications. We believe that this paper will help in bringing novel focus to existing digital forensics methodologies with a focus on smart applications.

[1]  Asif Iqbal,et al.  Digital Forensic Analysis of Industrial Control Systems Using Sandboxing: A Case of WAMPAC Applications in the Power Systems , 2019, Energies.

[2]  Imad Jawhar,et al.  UAVs for smart cities: Opportunities and challenges , 2014, 2014 International Conference on Unmanned Aircraft Systems (ICUAS).

[3]  Andrii Shalaginov,et al.  Advancing Neuro-Fuzzy Algorithm for Automated Classification in Largescale Forensic and Cybercrime Investigations: Adaptive Machine Learning for Big Data Forensic , 2018 .

[4]  Katrin Franke,et al.  Cyber crime investigations in the era of big data , 2017, 2017 IEEE International Conference on Big Data (Big Data).

[5]  Antonio Iera,et al.  SIoT: Giving a Social Structure to the Internet of Things , 2011, IEEE Communications Letters.

[6]  Geir M. Køien,et al.  Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks , 2015, J. Cyber Secur. Mobil..

[7]  Asif Iqbal,et al.  Digital Forensic Readiness in Critical Infrastructures: A Case of Substation Automation in the Power Sector , 2017, ICDF2C.

[8]  Salvatore Catanese,et al.  Crawling Facebook for social network analysis purposes , 2011, WIMS '11.

[9]  Friedemann Mattern,et al.  Living in a smart environment - implications for the coming ubiquitous information society , 2004, 2004 IEEE International Conference on Systems, Man and Cybernetics (IEEE Cat. No.04CH37583).

[10]  Kim-Kwang Raymond Choo,et al.  Digital forensic intelligence: Data subsets and Open Source Intelligence (DFINT+OSINT): A timely and cohesive mix , 2018, Future Gener. Comput. Syst..

[11]  Ahmed Khattab,et al.  Securing the Internet of Things and Wireless Sensor Networks via Machine Learning: A Survey , 2018, 2018 International Conference on Computer and Applications (ICCA).

[12]  Andrii Shalaginov Soft Computing and Hybrid Intelligence for Decision Support in Forensics Science , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[13]  Min Chen,et al.  A Survey on Internet of Things From Industrial Market Perspective , 2015, IEEE Access.

[14]  Brett A. Becker,et al.  Current Challenges and Future Research Areas for Digital Forensic Investigation , 2016, ArXiv.

[15]  Ali Dehghantanha,et al.  Machine Learning Aided Static Malware Analysis: A Survey and Tutorial , 2018, ArXiv.

[16]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[17]  Ahmad Diab,et al.  Darknet and deepnet mining for proactive cybersecurity threat intelligence , 2016, 2016 IEEE Conference on Intelligence and Security Informatics (ISI).

[18]  Paulo F. Pires,et al.  Towards an IoT ecosystem , 2013, SESoS.

[19]  Eric T. Matson,et al.  Drone forensic framework: Sensor and data identification and verification , 2017, 2017 IEEE Sensors Applications Symposium (SAS).

[20]  Asif Iqbal,et al.  Intelligent analysis of digital evidences in large-scale logs in power systems attributed to the attacks , 2018, 2018 IEEE International Conference on Big Data (Big Data).

[21]  Anthony Skjellum,et al.  Using machine learning to secure IoT systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[22]  Ralph Langner,et al.  Stuxnet: Dissecting a Cyberwarfare Weapon , 2011, IEEE Security & Privacy.

[23]  Muhammad Atif Tahir,et al.  Towards cloud based big data analytics for smart future cities , 2013, 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing.

[24]  Nicole J Watkins Situational Crime Prevention in Schools: Implications for Victimization, Delinquency, and Avoidance Behaviors , 2015 .

[25]  H. Farhangi,et al.  The path of the smart grid , 2010, IEEE Power and Energy Magazine.

[26]  Clara Aguirre Hernando Backstage to the Panama Papers: big data analytics and collaborative journalism , 2017 .

[27]  Kim-Kwang Raymond Choo,et al.  Smart vehicle forensics: Challenges and case study , 2020, Future Gener. Comput. Syst..

[28]  Bo Luo,et al.  Cyber-physical security for smart cars: taxonomy of vulnerabilities, threats, and attacks , 2015, ICCPS.

[29]  Xin Huang,et al.  Use of Machine Learning in Detecting Network Security of Edge Computing System , 2019, 2019 IEEE 4th International Conference on Big Data Analytics (ICBDA).

[30]  Ali Dehghantanha,et al.  Digital forensics: the missing piece of the Internet of Things promise , 2016 .

[31]  Marco Manca,et al.  eHealth, Care and Quality of Life , 2013 .

[32]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[33]  Rajkumar Buyya,et al.  Internet of Things: An Overview , 2017, ArXiv.