Enhancing IoT Forensics with Machine Learning-Based Anomaly Detection

Authors

  • Muhammad Faheem Khan Department of Computer Science, TIMES University, 60000, Multan, Punjab, Pakistan.
  • Muhammad Naveed Department of Computer Science, TIMES University, 60000, Multan, Punjab, Pakistan.

Keywords:

Cybersecurity, Node-to-Node, Forensic Analysis,, Machine Learning, Cyber Attacks, Internet of Things (IoT)

Abstract

The adaptability and rapid expansion of IoT systems have heightened the likelihood of cyberattacks. Resource-constrained IoT devices present a difficulty for security handlers in tracking records of various attacks during forensic analysis. Forensic analysis is typically conducted on devices to assess the extent of damage incurred as a result of various attacks. The primary aim of this research is to establish a framework that enables security to do forensic analysis on resource-constrained IoT devices. This study proposes a framework that adeptly does forensic analysis and identifies various sorts of attacks on endpoints (IoT devices) via a node-to-node (N2N) architecture. This proposed system integrates many forensic tools and machine learning techniques to detect different sorts of attacks. The issue of evidence retrieval from the compromised endpoint is resolved by utilizing a third-party log server. We utilized the logs from the Security Onion forensic server to ascertain the type and impact of the attack. This framework is capable of autonomously identifying assaults through the application of several machine learning methods.

Downloads

Published

2024-09-01

How to Cite

Muhammad Faheem Khan, & Muhammad Naveed. (2024). Enhancing IoT Forensics with Machine Learning-Based Anomaly Detection. Machine Learning for Human Intelligence, 2(02), 22–32. Retrieved from https://mlhi.org/index.php/main/article/view/13

Similar Articles

<< < 1 2 

You may also start an advanced similarity search for this article.