2017
DOI: 10.1007/978-3-319-70688-7_2
|View full text |Cite
|
Sign up to set email alerts
|

Cybercrimes Investigation and Intrusion Detection in Internet of Things Based on Data Science Methods

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…AI and ML, as previously stated by Hemdan and Manjaiah (2017), can aid in digital forensic analysis by identifying anomalies in network traffic, detecting malware, classifying files based on their content, and recognising objects and people in images and videos. Another crucial application of AI and ML in digital forensics is their ability to enhance investigation consistency and identify new criminal trends.…”
Section: Research Motivationmentioning
confidence: 99%
“…AI and ML, as previously stated by Hemdan and Manjaiah (2017), can aid in digital forensic analysis by identifying anomalies in network traffic, detecting malware, classifying files based on their content, and recognising objects and people in images and videos. Another crucial application of AI and ML in digital forensics is their ability to enhance investigation consistency and identify new criminal trends.…”
Section: Research Motivationmentioning
confidence: 99%
“…In the context of the collection process, this stage is a process of extracting evidence based on various platforms, sources, and types of data evidence. Many studies reveal that in the IoT forensic investigation phase, the process of identifying possible data sources [32], [35], [18], determines the physical location of evidence [52] duplication of digital evidence for validated processes [53], and assumes the integrity and validity of digital evidence [32], [15], [52], [54].…”
Section: B Rq2: Core and Essential Phase Of Iot Forensicsmentioning
confidence: 99%
“…In the examination process, two main objectives must be achieved during the IoT forensic investigation process: identifying and validating procedures for finding and analyzing sensitive data [53], [7], extraction of hidden data, identification of complex data and pattern matching [9], [52]. However, some of the additional tasks that are specifically performed during the IoT investigation process include determining how data was collected, where and by whom, identifying visible digital evidence, analyzing the ability levels of suspects, and transforming data to a size and type that is more accessible for analysis [9], [52].…”
Section: B Rq2: Core and Essential Phase Of Iot Forensicsmentioning
confidence: 99%
“…Hemdan and Manjaiah [19] provide an overview of the principles of digital forensics, intrusion detection and suitable types of data science methods in the context of Internet of Things. The authors list prediction, classification, clustering and relation rule techniques as appropriate techniques for intrusion detection.…”
Section: Data Analysis In the Cloudmentioning
confidence: 99%