Cyber Forensics and Investigation on Smart Devices: Volume 1 -  - E-Book

Cyber Forensics and Investigation on Smart Devices: Volume 1 E-Book

0,0
36,48 €

-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.
Mehr erfahren.
Beschreibung

This book offers comprehensive insights into digital forensics, guiding readers through analysis methods and security assessments. Expert contributors cover a range of forensic investigations on computer devices, making it an essential resource for professionals, scholars, and students alike.

Chapter 1 explores smart home forensics, detailing IoT forensic analysis and examination of different smart home devices. Chapter 2 provides an extensive guide to digital forensics, covering its origin, objectives, tools, challenges, and legal considerations. Chapter 3 focuses on cyber forensics, including secure chat application values and experimentation. Chapter 4 delves into browser analysis and exploitation techniques, while Chapter 5 discusses data recovery from water-damaged Android phones with methods and case studies. Finally, Chapter 6 presents a machine learning approach for detecting ransomware threats in healthcare systems.

With a reader-friendly format and practical case studies, this book equips readers with essential knowledge for cybersecurity services and operations.

Key Features:
Integrates research from various fields (IoT, Big Data, AI, and Blockchain) to explain smart device security.
Uncovers innovative features of cyber forensics and smart devices.
Harmonizes theoretical and practical aspects of cybersecurity.
Includes chapter summaries and key concepts for easy revision.
Offers references for further study.

Readership:
Professionals, apprentices, teachers, and scholars in cyber security and digital forensics programs.

Das E-Book können Sie in Legimi-Apps oder einer beliebigen App lesen, die das folgende Format unterstützen:

EPUB
MOBI

Seitenzahl: 192

Veröffentlichungsjahr: 2024

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents
BENTHAM SCIENCE PUBLISHERS LTD.
End User License Agreement (for non-institutional, personal use)
Usage Rules:
Disclaimer:
Limitation of Liability:
General:
FOREWORD
PREFACE
List of Contributors
Smart Home Forensics
Abstract
1. INTRODUCTION
2. RELATED WORK
3. SMART HOME LABS
3.1. Process of IoT Forensic Analysis
3.2. The Flow of the Process of IoT Forensic Analysis
3.2.1. Seizure and Identification
3.2.2. Extraction
3.2.3. Preservation
3.2.4. Analysis
3.2.5. Reconstruction
3.2.6. Reporting
3.2.6.1. Initialization
3.2.6.2. Acquisition
3.2.6.3. Investigation
4. Forensic Analysis of A Smart Home
4.1. Lab for Intelligent Residences: An Initial Examination
4.2.1. Analyses of Media Streaming Players
4.2.2. Analysis of Smart Watches
4.2.3. Analyses of the Intelligent Hub
4.2.4. An Examination of Smart Doorbells and Smart Locks
4.2.5. Analyzing Applications for Network Security
4.2.6. Data Mining for the Smart Plug
4.2.7. Analyzing the Smart Cameras
4.2.8. Analysis of Smart Bulb
5. SCENARIOS FOR POSSIBLE SMART HOME THREATS
CONCLUSION
REFERENCES
A Guide to Digital Forensic: Theoretical To Software Based Investigations
Abstract
1. INTRODUCTION
1.1. Origin of Digital Forensics
1.2. Objectives of Digital Forensics
2. Digital Forensics And Its Current Issues
2.1. Prominent Issues of Digital Forensics
2.1.1. Social Networking
2.1.2. The Growing Size of Storage
2.1.3. Mobile and Embedded Devices
2.1.4. Encryption of Course
2.1.5. Anti-Forensics
3. Phases of Digital Forensics
3.1. Identification
3.2. Preservation
3.3. Analysis
3.4. Documentation
3.5. Presentation
4. Different Types of Digital Forensics
4.1. Disk Forensics
4.2. Networks Forensics
4.3. Email Forensics
4.4. Malware Forensics
4.5. Database Forensics and Memory Forensics
4.6. Mobile Phone Forensics
5. Tools For Digital Forensic Analysis
5.1. EnCase
5.2. Sleuth Kit
5.3. FTK Toolkit
6. Cybercrime Digital Forensics Tools
6.1. MemGator
6.2. First on Scene
6.3. Galleta
6.4. Ethreal
6.5. Pasco
6.6. Rifiuti
6.7. Network Mapper (Nmap)
7. Use Cases and Software Implications of Digital Forensics
7.1. FTK Forensic Toolkit
7.1.1. Applications
7.2. IBM Security QRadar
7.3. ExtraHop
7.3.1. Background
7.4. Parrot Security OS
7.4.1. System Basic Requirements
7.4.2. Features
7.5. Sleuth Kit (+Autopsy)
7.5.1. Applications
7.5.2. Features
8. Digital Forensics Challenges/Advantages/Disadvant- ages/Applications
8.1. Challenges
8.1.1. Proof Oriented Design
8.1.2. Data View Inconsistency
8.1.3. Item Interpolation Mechanism
8.1.4. Run-Time Versus Execution
8.1.5. Digital Forensic Awareness
8.1.6. Technology Gap
8.1.7. Technology Versus tools
8.2. Pros of Digital Forensics
8.3. Cons of Digital Forensics
8.4. Applications of Digital Forensics
9. Legitimate Considerations
9.1. Legal Consideration
10. Artificial Intelligence and its Application in Digital Forensics
Conclusion
References
Cyber Forensic: End-to-End Secure Chat Application Value Beyond Claimed Encryption Method
Abstract
1. INTRODUCTION
2. EXPERIMENT WORK
3. ADDITIONAL INSIGHT
Conclusion
REFERENCES
Browser Analysis and Exploitation
Abstract
1. INTRODUCTION
2. LITERATURE REVIEW
3. POPULAR BROWSERS
3.1. The Chromium Project
3.2. Firefox
3.3. Safari
4. EXTRACTING INFORMATION FROM BROWSER SQLITE FILES
4.1. Parsing SQLITE Files
4.2. Using a Simple Python Script
4.2.1. Using “Db Browser for SQLite”
4.2.2. Web Browser Artifacts for Forensics
4.2.3. Extracting Encrypted Information from Chromium-based Browsers
4.2.4. Analyze Artifacts Found within the Extensible Storage Engine (ESE) Database Format
4.2.5. Examine Files Downloaded by Suspect
4.2.6. Determine URLs that Suspects typed, Clicked on, and Bookmarked (Check for Malicious URLs visited)
4.2.6.1. Searched/Typed Keywords
4.2.6.2. Visited URLs
4.2.6.3. Bookmarks
4.2.6.4. Investigate Browser Auto-Complete Data / Form-Data and Saved Credentials
4.2.6.4.1. Autocomplete Data (or) Form Data
4.2.6.4.2. Saved Credentials
5. ISSUES IN BROWSER FORENSICS
CONCLUDING REMARKS
REFERENCES
Data Recovery from Water-damaged Android Phones
Abstract
1. INTRODUCTION
1.1. Phone Parts Damaged when dropped into the Water
1.2. What Should One Do If the Phone Gets Wet or Contacts Any Liquid?
1.2.1. Take Out Mobile from Water
1.2.2. Remove all Parts from Smartphones
2. LITERATURE REVIEW
3. DATA RECOVERY
3.1. Data Recovery using Google Drive
4. DATA RECOVERY FROM DAMAGED MOBILE
4.1. Case Study 1
4.1.1. The Evolution of Mobile Forensics at NIST
4.1.2. NIST Forensic Methods
4.2. Case Study 2
4.2.1. When is a Chip-Off Extraction to be Considered?
4.2.2. What kinds of Devices can a Chip-Off Extract?
4.3. Experimental Setup
4.4. Chip-off Method
5. RESULTS
CONCLUSION
REFERENCES
Machine Learning Approach to Detect Ransomware Threats in Health Care Systems
Abstract
1. INTRODUCTION
2. IMPACT OF CYBER THREATS ON MEDICAL DATA
2.1. Dataset Description
2.2. Related Work
3. PROPOSED DETECTION SYSTEM
CONCLUSION
REFERENCES
Cyber Forensics and Investigation on Smart Devices
(Volume 1)
Edited By
Akashdeep Bhardwaj
Cybersecurity & Digital Forensics
University of Petroleum and Energy Studies
UPES, Dehradun
India
&
Keshav Kaushik
School of Computer Science
University of Petroleum and Energy Studies
Dehradun
India

BENTHAM SCIENCE PUBLISHERS LTD.

End User License Agreement (for non-institutional, personal use)

This is an agreement between you and Bentham Science Publishers Ltd. Please read this License Agreement carefully before using the book/echapter/ejournal (“Work”). Your use of the Work constitutes your agreement to the terms and conditions set forth in this License Agreement. If you do not agree to these terms and conditions then you should not use the Work.

Bentham Science Publishers agrees to grant you a non-exclusive, non-transferable limited license to use the Work subject to and in accordance with the following terms and conditions. This License Agreement is for non-library, personal use only. For a library / institutional / multi user license in respect of the Work, please contact: [email protected].

Usage Rules:

All rights reserved: The Work is the subject of copyright and Bentham Science Publishers either owns the Work (and the copyright in it) or is licensed to distribute the Work. You shall not copy, reproduce, modify, remove, delete, augment, add to, publish, transmit, sell, resell, create derivative works from, or in any way exploit the Work or make the Work available for others to do any of the same, in any form or by any means, in whole or in part, in each case without the prior written permission of Bentham Science Publishers, unless stated otherwise in this License Agreement.You may download a copy of the Work on one occasion to one personal computer (including tablet, laptop, desktop, or other such devices). You may make one back-up copy of the Work to avoid losing it.The unauthorised use or distribution of copyrighted or other proprietary content is illegal and could subject you to liability for substantial money damages. You will be liable for any damage resulting from your misuse of the Work or any violation of this License Agreement, including any infringement by you of copyrights or proprietary rights.

Disclaimer:

Bentham Science Publishers does not guarantee that the information in the Work is error-free, or warrant that it will meet your requirements or that access to the Work will be uninterrupted or error-free. The Work is provided "as is" without warranty of any kind, either express or implied or statutory, including, without limitation, implied warranties of merchantability and fitness for a particular purpose. The entire risk as to the results and performance of the Work is assumed by you. No responsibility is assumed by Bentham Science Publishers, its staff, editors and/or authors for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products instruction, advertisements or ideas contained in the Work.

Limitation of Liability:

In no event will Bentham Science Publishers, its staff, editors and/or authors, be liable for any damages, including, without limitation, special, incidental and/or consequential damages and/or damages for lost data and/or profits arising out of (whether directly or indirectly) the use or inability to use the Work. The entire liability of Bentham Science Publishers shall be limited to the amount actually paid by you for the Work.

General:

Any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims) will be governed by and construed in accordance with the laws of Singapore. Each party agrees that the courts of the state of Singapore shall have exclusive jurisdiction to settle any dispute or claim arising out of or in connection with this License Agreement or the Work (including non-contractual disputes or claims).Your rights under this License Agreement will automatically terminate without notice and without the need for a court order if at any point you breach any terms of this License Agreement. In no event will any delay or failure by Bentham Science Publishers in enforcing your compliance with this License Agreement constitute a waiver of any of its rights.You acknowledge that you have read this License Agreement, and agree to be bound by its terms and conditions. To the extent that any other terms and conditions presented on any website of Bentham Science Publishers conflict with, or are inconsistent with, the terms and conditions set out in this License Agreement, you acknowledge that the terms and conditions set out in this License Agreement shall prevail.

Bentham Science Publishers Pte. Ltd. 80 Robinson Road #02-00 Singapore 068898 Singapore Email: [email protected]

FOREWORD

Smart devices are now being commonly used by everyone in their daily lives for routine activities. These smart devices enable us to connect with others (smartphones), have driverless cars (smart cars), secure our buildings (smart locks), remotely control appliances in our homes (smart homes), and remind us to do things and do things for us (smart assistants like Alexa and Siri). At the personal level, wearables enable us to use these smart devices on our bodies and wear them like accessories or embedded in our clothing or implanted in our bodies. For example, we wear smartwatches and fitness trackers to keep track of our physical activities, our heart rate, and our quality of sleep. For healthcare, we use wearables to measure our temperature, blood pressure, breathing rate, blood sugar level, heartbeat rate, and brain activity and monitor our vital signs. Smart devices and wearables have become pervasive, but they need Internet or Network connectivity and Internet of Things infrastructure.

As smart devices, wearables, and implantable technologies get more traction in healthcare, we need to be mindful of their security because of their connectivity to the Internet. For example, pacemakers now have built-in WIFI connectivity for any adjustments that are required in the future. Next-generation cardiac wearables and other implantables will integrate into Wireless Body Area Networks (WBAN). Specialists will sit at their desktops, connect to these implantables via the WIFI, and make adjustments. Such connectivity poses security risks, and these risks are not only monetary losses but also losses of life if the implantables are sabotaged. Therefore, the security issues of these devices through cyber forensics and investigations are thoroughly explored in this edited book. The vulnerability of these devices is mostly during data transmission to the cloud or the owner’s personal device with which it is paired. Blockchain-based security controls are now being implemented with two-factor authentication (2FA) by most device makers to mitigate against such security vulnerabilities.

As lives are at stake, we need to have a foolproof process to investigate and ascertain the intent of the cyber attackers and potential sabotages while gathering evidence to prosecute them and defend the devices from future attacks. The cyber forensics and investigation process is ideal as it allows investigators (depending on which standard you follow) to identify, obtain, process, and analyse data to report about the security incidents that took place to management for mitigation action and authorities for prosecution. As the smart devices are part of a network or connected via a wireless network, network monitoring is possible, and all the cyber security protocols can be applied to these smart devices, logs can be inspected, and all activities monitored for forensics. The cyber forensics and investigation process will encourage the adoption and use of smart devices such as the Internet of Things (IoT), Internet of Everything (IoE), and Internet of Bodies (IoB) to become pervasive. All these devices and things will sense, collect, process, and store huge amounts of data (big data) and will create unprecedented opportunities for us to investigate the evidence through the discipline of cyber forensics.

This book on cyber forensics and investigation on smart devices is a timely publication as we undergo digital transformations. Smart devices, wearables, and implantables are getting cheaper, powerful, and are able to handle many processes with network connectivity. With the proliferation of Internet of Things (IoT) devices, the attack surface area has dramatically increased for hackers and the threat surface area has significantly increased for cyber security specialists. This book covers the architecture, deployment problems, applications, data processing, storage, and review of Internet of Things (IoT) protection and privacy problems in a cloud-based approach. The main idea behind this book is to give a practical guide to readers that will cover the advanced tools and techniques used in the domain of cyber forensics and investigation. I hope the readers find the book inspiring and gain a working knowledge of cyber security issues facing smart devices and the mitigation solutions that can be applied to prevent breaches. It is evident that smart devices will become ubiquitous and will become indispensable. The best we can do is learn to live with smart devices by identifying cybersecurity issues and mitigating them.

Sam Goundar RMIT University Melbourne Australia

PREFACE

Cyber forensics and investigation on smart devices (CFISD) by Bentham Science is the brainchild of Akashdeep Bhardwaj and Keshav Kaushik. The focus of this book is to bring all the related managerial applications of cyber security and digital forensics to a single platform, so that undergraduate and postgraduate students, researchers, academicians, and industry people can easily understand. This edited book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience for the book incorporates specialists, researchers, graduate understudies, designers, experts, and managers who are researching this domain. The edited book will be organized into independent chapters to provide readers with great readability, adaptability, and flexibility. Big thanks to all our co-authors, who are experts in their own domains, for sharing their experience and knowledge. This book is an attempt to compile their ideas in the form of chapters and share them with the world. This book provides insights into cyber forensics, cybercrimes, mobile forensics, cyber investigations, Internet of Things, smart home, smart devices, and sensors. The book will be helpful for security professionals, cyber forensic experts, academicians, scientists, advanced-level students, penetration testers, and researchers working in the field of cyber forensics and IoT. We would like to thank the contributors to this book for their smooth collaboration and Bentham Science Publishers.

Akashdeep Bhardwaj Cybersecurity & Digital Forensics University of Petroleum and Energy Studies UPES, Dehradun India &Keshav Kaushik School of Computer Science

List of Contributors

Ankit VishnoiSchool of Computer Science and Engineering, Manipal University, Jaipur, IndiaAbhishek K. PradhanSchool of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, IndiaDevakrishna C. NairSchool of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, IndiaHitesh Kumar SharmaSchool of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun, 248007, IndiaHemanta Kumar BhuyanDepartment of Information Technology, Vignan's Foundation for Science, Technology & Research (Deemed to be University), Guntur, Andhra Pradesh, IndiaHepi SutharRashtriya Raksha University, Gandhinagar, India Vishwakarma University, Pune, IndiaLuxmi SapraSchool of Computing, Graphic Era Hill University, Dehradun, IndiaLokaiah PullaguraDepartment of Computer Science & Engineering, Faculty of Engineering & Technology, Jain Global Campus, Jain University, Kanakapura-562112, Ramanagara District, Karnataka, IndiaManoj KumarSchool of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun, 248007, IndiaNalli Vinaya KumariDepartment of Computer Science & Engineering, Malla Reddy Institute of Technology and Science, Hyderabad, IndiaPreetiSchool of Computer Science, University of Petroleum and Energy Studies (UPES), Dehradun, 248007, IndiaPrabhu Manikandan VSchool of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, IndiaTripti MisraSchool of Computer Science, University of Petroleum and Energy Studies, Dehradun, Uttarakhand, IndiaVarun SapraSchool of Computer Science, University of Petroleum and Energy Studies Gurugram, India

Smart Home Forensics

Lokaiah Pullagura1,*,Nalli Vinaya Kumari2,Hemanta Kumar Bhuyan3
1 Department of Computer Science & Engineering, Faculty of Engineering & Technology, Jain Global Campus, Jain University, Kanakapura-562112, Ramanagara District, Karnataka, India
2 Department of Computer Science & Engineering, Malla Reddy Institute of Technology and Science, Hyderabad, India
3 Department of Information Technology, Vignan's Foundation for Science, Technology & Research (Deemed to be University), Guntur, Andhra Pradesh, India

Abstract

The Internet of Things (IoT) has unquestionably exploded into the forefront of everyone's lives, whether they realise it or not. Internet of Things (IoT) technology is now used in medical devices, transportation, and even in our homes. Devices such as these have the ability to access a great deal of personal information. Because of their diminutive size, these devices have made insufficient efforts to build security into their design. Sensors, cameras, and lights are all examples of Internet of Things (IoT) devices that can be used to automate daily tasks around the home. Smartphones and speakers can be used as remote controllers to operate these gadgets. A smart home's IoT devices collect and process data on motion, temperature, lighting control, and other variables, and they store a wider range of data from more diverse users. A wide variety of smart home devices can make extracting meaningful data difficult because of their differing data storage methods. Data from a variety of smart home devices, as well as data that can be used in digital forensics, must be collected and analysed. Google Nest Hub and Samsung Smart Things are the primary sources of forensic smart home data that will be analysed in this study. As a result, we analysed the smart home data collected using companion apps, web interfaces, and APIs to find information that was relevant to our investigation. Various types of data collected by smart homes are also discussed in the paper, and they can be used as crucial evidence in certain forensic cases. IoT devices in a smart home can be hacked, and we'll investigate how, what data can be recovered, and where it resides after it has been hacked as part of our investigation.

Keywords: Cybersecurity, Digital evidence, Digital forensics, Data analysis, Evidence collection, Forensics, Home automation, Internet of things (IoT), Investigative techniques, Smart home.
*Corresponding author Lokaiah Pullagura: Department of Computer Science & Engineering, Faculty of Engineering & Technology, Jain Global Campus, Jain University, Kanakapura-562112, Ramanagara District, Karnataka, India; Email: [email protected].

1. INTRODUCTION

Home owners can benefit from new internet-enabled devices that are easy and safe to use. The introduction of new internet-enabled devices, particularly at home, is seen as a convenient and safe way to enhance human life. A home's systems can be controlled, monitored, and even entertained using Internet-enabled gadgets. A “smart house” is comprised of gadgets like this one. Throughout this paper, we'll refer to these gadgets as the “Internet of Things” (IoT). A whopping $53 billion could be generated by smart home gadgets like smart plugs and switches, smart speakers, and surveillance camera systems by 2022 [1, 2]. Despite the rapid uptake of IoT devices in the home, there have been reports of cyber-attacks and privacy concerns [3, 4]. Avast [5] estimates that one out of every two Internet of Things (IoT) devices in smart homes is vulnerable to cyberattacks. IoT devices are ubiquitous in today's smart homes, making security and privacy a top priority. An estimated 75% of people say they don't trust their IoT devices when it comes to handling and sharing their personal information [6]. Smart homes have become increasingly popular due to their convenience and ability to automate various aspects of daily life. However, with this increased reliance on technology, there is a growing need for forensic investigation of smart homes in cases of security breaches, theft, or other criminal activity. Smart home forensics involves the application of forensic techniques to digital devices and networks that make up a smart home, including the analysis of data from devices such as smart speakers, thermostats, security cameras, and home automation systems, as well as the examination of network traffic and other digital evidence. Smart homes consist of various interconnected devices and systems that are controlled by a central hub or app [6]. These devices can include smart TVs, home security systems, smart thermostats, and even smart refrigerators. They are designed to make life easier and more convenient for users, but they can also create vulnerabilities that can be exploited by hackers and other malicious actors. Smart home forensics involves the use of forensic techniques to analyze digital devices and data in order to identify evidence of unauthorized access, data theft, or other criminal activity. This may involve the collection and analysis of data from various smart devices, such as security camera footage, device logs, and other digital data. Forensic investigators may also examine network traffic to identify unusual activity and potential sources of attacks. One of the challenges of smart home forensics is the lack of standardization in smart home devices and protocols. Different manufacturers use different technologies and standards, making it difficult to create a unified approach to forensic investigation. Additionally, the complexity of smart home systems can make it difficult to identify and analyze potential sources of evidence. Another challenge is the need for specialized tools and techniques for forensic analysis. Traditional forensic tools may not be sufficient for analyzing smart home devices and data, and investigators may need to use specialized software and hardware tools to extract and analyze data from these devices. Despite these challenges, the importance of smart home forensics is likely to continue to grow as more people adopt smart home technology. Forensic investigators and other professionals will need to develop the necessary skills and knowledge to effectively investigate these types of cases and identify and prevent potential security threats [7]. An in-depth examination of forensic investigations into smart homes and the use of a laboratory to look into potential threats is provided. Both methods are described in great detail. The data from the IoT lab will assist us in answering the following research questions: There are a number of smart home devices and smartphone apps that can provide valuable information. How secure are these smart home gadgets when it comes to personal data? Does the security of these smart home devices need to be improved? For smart home devices, what are the best ways to collect and analyse data? These smart home appliances are exchanging what kinds of personal information. It's laid out like this: Section 2 provides background information on IoT forensics and Smart Home devices. Section 3 and Section 4 describe our smart home lab and the digital forensic investigative process. Threats to smart homes are discussed in Section 5 of this document. Finally, Section 6 brings an end to all of our hard work.

2. RELATED WORK