Cyber Forensics and Investigation on Smart Devices: Volume 1
By Akashdeep Bhardwaj (Editor) and Keshav Kaushik (Editor)
()
About this ebook
This book offers comprehensive insights into digital forensics, guiding readers through analysis methods and security assessments. Expert contributors cover a range of forensic investigations on computer devices, making it an essential resource for professionals, scholars, and students alike.
Chapter 1 explores smart home forensics, detailing IoT forensic analysis and examination of different smart home devices. Chapter 2 provides an extensive guide to digital forensics, covering its origin, objectives, tools, challenges, and legal considerations. Chapter 3 focuses on cyber forensics, including secure chat application values and experimentation. Chapter 4 delves into browser analysis and exploitation techniques, while Chapter 5 discusses data recovery from water-damaged Android phones with methods and case studies. Finally, Chapter 6 presents a machine learning approach for detecting ransomware threats in healthcare systems.
With a reader-friendly format and practical case studies, this book equips readers with essential knowledge for cybersecurity services and operations.
Key Features:
Integrates research from various fields (IoT, Big Data, AI, and Blockchain) to explain smart device security.
Uncovers innovative features of cyber forensics and smart devices.
Harmonizes theoretical and practical aspects of cybersecurity.
Includes chapter summaries and key concepts for easy revision.
Offers references for further study.
Readership:
Professionals, apprentices, teachers, and scholars in cyber security and digital forensics programs.
Related to Cyber Forensics and Investigation on Smart Devices
Titles in the series (1)
Cyber Forensics and Investigation on Smart Devices: Volume 1 Rating: 0 out of 5 stars0 ratings
Related ebooks
IoT Applications and Use Cases Rating: 0 out of 5 stars0 ratingsIoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications Rating: 0 out of 5 stars0 ratingsThe Future of Cybersecurity: Guarding the Digital Frontier: Strategies, Tools, and Best Practices Rating: 0 out of 5 stars0 ratingsArtificial Intelligence and Knowledge Processing: Methods and Applications Rating: 0 out of 5 stars0 ratingsArtificial Intelligence and Natural Algorithms Rating: 0 out of 5 stars0 ratingsInternet of Things Theory and Practice: Build Smarter Projects to Explore the IoT Architecture and Applications (English Edition) Rating: 0 out of 5 stars0 ratingsInternet of Things & Wireless Sensor Network Rating: 0 out of 5 stars0 ratingsiOS Forensics 101: Extracting Logical And Physical Data From iPhone, iPad And Mac OS Rating: 0 out of 5 stars0 ratingsIntelligent Systems for IoE Based Smart Cities Rating: 0 out of 5 stars0 ratingsThe Essential Guide to Internet of Things (IoT) Rating: 0 out of 5 stars0 ratingsIndustry 4.0 Convergence with AI, IoT, Big Data and Cloud Computing: Fundamentals, Challenges and Applications Rating: 0 out of 5 stars0 ratingsThe Internet of Things: Living in a connected world Rating: 0 out of 5 stars0 ratingsInternet of Things Rating: 0 out of 5 stars0 ratingsArtificial Intelligence Class 7: Skill Education for Class 7th, Code (417) Rating: 0 out of 5 stars0 ratingsThe Internet of Things Explained Rating: 4 out of 5 stars4/5Blockchain and IoT based Smart Healthcare Systems Rating: 0 out of 5 stars0 ratingsInnovative IoT: Comprehensive Guide Rating: 0 out of 5 stars0 ratingsBlue Team Operations: Operatonal Security, Incident Response & Digital Forensics Rating: 0 out of 5 stars0 ratingsCybersecurity in Our Digital Lives Rating: 5 out of 5 stars5/5Secure Edge Computing for IoT Rating: 0 out of 5 stars0 ratingsIoT for Beginners: Explore IoT Architecture, Working Principles, IoT Devices, and Various Real IoT Projects Rating: 0 out of 5 stars0 ratingsIntroduction to Sensors in IoT and Cloud Computing Applications Rating: 0 out of 5 stars0 ratingsBlockchain Applications for Secure IoT Frameworks: Technologies Shaping the Future Rating: 0 out of 5 stars0 ratingsThe Internet of Things Explained - How Smart Devices are Shaping Our World Rating: 0 out of 5 stars0 ratingsDesigning Scalable IoT Solutions with ThingsBoard: Definitive Reference for Developers and Engineers Rating: 0 out of 5 stars0 ratingsInternet of Things: Connecting Devices for a Smarter Future Rating: 0 out of 5 stars0 ratings“Careers in Information Technology: IoT Embedded Systems Designer”: GoodMan, #1 Rating: 0 out of 5 stars0 ratingsInnovation Landscape brief: Internet of Things Rating: 0 out of 5 stars0 ratingsIoT Security Mastery: Essential Best Practices for the Internet of Things Rating: 0 out of 5 stars0 ratingsInternet of Things (IoT): Principles, Paradigms and Applications of IoT Rating: 0 out of 5 stars0 ratings
Security For You
Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5How to Hack Like a Pornstar Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5Amazon Web Services (AWS) Interview Questions and Answers Rating: 5 out of 5 stars5/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5CISA Certified Information Systems Auditor Study Guide Rating: 5 out of 5 stars5/5Unmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsIAPP CIPM Certified Information Privacy Manager Study Guide Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5CompTIA Network+ Practice Tests: Exam N10-008 Rating: 0 out of 5 stars0 ratingsHands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5
Reviews for Cyber Forensics and Investigation on Smart Devices
0 ratings0 reviews
Book preview
Cyber Forensics and Investigation on Smart Devices - Akashdeep Bhardwaj
Smart Home Forensics
Lokaiah Pullagura¹, *, Nalli Vinaya Kumari², Hemanta Kumar Bhuyan³
¹ Department of Computer Science & Engineering, Faculty of Engineering & Technology, Jain Global Campus, Jain University, Kanakapura-562112, Ramanagara District, Karnataka, India
² Department of Computer Science & Engineering, Malla Reddy Institute of Technology and Science, Hyderabad, India
³ Department of Information Technology, Vignan's Foundation for Science, Technology & Research (Deemed to be University), Guntur, Andhra Pradesh, India
Abstract
The Internet of Things (IoT) has unquestionably exploded into the forefront of everyone's lives, whether they realise it or not. Internet of Things (IoT) technology is now used in medical devices, transportation, and even in our homes. Devices such as these have the ability to access a great deal of personal information. Because of their diminutive size, these devices have made insufficient efforts to build security into their design. Sensors, cameras, and lights are all examples of Internet of Things (IoT) devices that can be used to automate daily tasks around the home. Smartphones and speakers can be used as remote controllers to operate these gadgets. A smart home's IoT devices collect and process data on motion, temperature, lighting control, and other variables, and they store a wider range of data from more diverse users. A wide variety of smart home devices can make extracting meaningful data difficult because of their differing data storage methods. Data from a variety of smart home devices, as well as data that can be used in digital forensics, must be collected and analysed. Google Nest Hub and Samsung Smart Things are the primary sources of forensic smart home data that will be analysed in this study. As a result, we analysed the smart home data collected using companion apps, web interfaces, and APIs to find information that was relevant to our investigation. Various types of data collected by smart homes are also discussed in the paper, and they can be used as crucial evidence in certain forensic cases. IoT devices in a smart home can be hacked, and we'll investigate how, what data can be recovered, and where it resides after it has been hacked as part of our investigation.
Keywords: Cybersecurity, Digital evidence, Digital forensics, Data analysis, Evidence collection, Forensics, Home automation, Internet of things (IoT), Investigative techniques, Smart home.
* Corresponding author Lokaiah Pullagura: Department of Computer Science & Engineering, Faculty of Engineering & Technology, Jain Global Campus, Jain University, Kanakapura-562112, Ramanagara District, Karnataka, India; Email: [email protected].
1. INTRODUCTION
Home owners can benefit from new internet-enabled devices that are easy and safe to use. The introduction of new internet-enabled devices, particularly at home, is seen as a convenient and safe way to enhance human life. A home's systems can be controlled, monitored, and even entertained using Internet-enabled gadgets. A smart house
is comprised of gadgets like this one. Throughout this paper, we'll refer to these gadgets as the Internet of Things
(IoT). A whopping $53 billion could be generated by smart home gadgets like smart plugs and switches, smart speakers, and surveillance camera systems by 2022 [1, 2]. Despite the rapid uptake of IoT devices in the home, there have been reports of cyber-attacks and privacy concerns [3, 4]. Avast [5] estimates that one out of every two Internet of Things (IoT) devices in smart homes is vulnerable to cyberattacks. IoT devices are ubiquitous in today's smart homes, making security and privacy a top priority. An estimated 75% of people say they don't trust their IoT devices when it comes to handling and sharing their personal information [6]. Smart homes have become increasingly popular due to their convenience and ability to automate various aspects of daily life. However, with this increased reliance on technology, there is a growing need for forensic investigation of smart homes in cases of security breaches, theft, or other criminal activity. Smart home forensics involves the application of forensic techniques to digital devices and networks that make up a smart home, including the analysis of data from devices such as smart speakers, thermostats, security cameras, and home automation systems, as well as the examination of network traffic and other digital evidence. Smart homes consist of various interconnected devices and systems that are controlled by a central hub or app [6]. These devices can include smart TVs, home security systems, smart thermostats, and even smart refrigerators. They are designed to make life easier and more convenient for users, but they can also create vulnerabilities that can be exploited by hackers and other malicious actors. Smart home forensics involves the use of forensic techniques to analyze digital devices and data in order to identify evidence of unauthorized access, data theft, or other criminal activity. This may involve the collection and analysis of data from various smart devices, such as security camera footage, device logs, and other digital data. Forensic investigators may also examine network traffic to identify unusual activity and potential sources of attacks. One of the challenges of smart home forensics is the lack of standardization in smart home devices and protocols. Different manufacturers use different technologies and standards, making it difficult to create a unified approach to forensic investigation. Additionally, the complexity of smart home systems can make it difficult to identify and analyze potential sources of evidence. Another challenge is the need for specialized tools and techniques for forensic analysis. Traditional forensic tools may not be sufficient for analyzing smart home devices and data, and investigators may need to use specialized software and hardware tools to extract and analyze data from these devices. Despite these challenges, the importance of smart home forensics is likely to continue to grow as more people adopt smart home technology. Forensic investigators and other professionals will need to develop the necessary skills and knowledge to effectively investigate these types of cases and identify and prevent potential security threats [7]. An in-depth examination of forensic investigations into smart homes and the use of a laboratory to look into potential threats is provided. Both methods are described in great detail. The data from the IoT lab will assist us in answering the following research questions: There are a number of smart home devices and smartphone apps that can provide valuable information. How secure are these smart home gadgets when it comes to personal data? Does the security of these smart home devices need to be improved? For smart home devices, what are the best ways to collect and analyse data? These smart home appliances are exchanging what kinds of personal information. It's laid out like this: Section 2 provides background information on IoT forensics and Smart Home devices. Section 3 and Section 4 describe our smart home lab and the digital forensic investigative process. Threats to smart homes are discussed in Section 5 of this document. Finally, Section 6 brings an end to all of our hard work.
2. RELATED WORK
The Internet of Things (IoT) refers to the network of physical devices, vehicles, home appliances, and other items that are embedded with electronics, software, sensors, and network connectivity, allowing them to connect and exchange data. Smart home devices are a subset of IoT devices, specifically designed to automate and optimize the control of home appliances and systems [8]. The forensic investigation of IoT devices, including smart home devices, is an emerging field that involves the use of specialized techniques and tools to collect, preserve, and analyze digital evidence. The investigation of IoT devices typically involves a combination of network analysis, digital forensic techniques, and traditional investigative