Network Forensics For Detecting Flooding Attack On Internet of Things IoT Device
Network Forensics For Detecting Flooding Attack On Internet of Things IoT Device
The Society of Digital Information and Wireless Communications (SDIWC), 2018 ISSN: 2305-001
Network Forensics for Detecting Flooding Attack on
Internet of Things (IoT) Device
devices, related to computer crime. In the digital Detection Stage : Generate a warning or an
forensics, we will first be including on the alert which indicate security offense.
network forensics. Incident Response Stage : Usable only when
Network forensics is defined in [8] as capture, the investigation is beginning in the course of
recording, and analysis of network events in the attack.
order to discover the source of security attacks or Collection Stage : The most complicated
other problem incidents. In other words, network section because the data streams quickly and
forensics involves capturing, recording and is no possibility to generate later traces of the
analyzing of network traffic. Serves to collect of same thing.
information, evidence gathering and detect Preservation Stage : Original Evidence is
attacks. The process of investigation occurred in kept secure through with computed hashes.
the network with handling the traffic and Examination Stage : Examines the previous
activity. Differ from the other method, the phase. All hidden or altered data is to be
network forensics related to dynamic uncovered which is done by the attacker.
information that is easily lost. Network Forensics Analysis Stage : Collected evidence is
has two functions, the first outline to security, analyzed to locate the source of the mixing.
belonging traffic monitoring network which aims
Investigation Stage : Use information
to get the evidence given is the lack of evidence gathered in the analysis phase and focus on
in the network so that the investigation could not finding the attacker.
walk. Second, regarding law enforcement that
Presentation Stage : Final stage for
analysis on capturing of network traffic may
processing the model. Here the
contain sending a file, searching for keywords,
documentation is made and the report is
and breakdown in communications made as in
generated and is shown to the higher
email and chat.
authority.
2.2 Network Forensics Process Model
In a paper called “A Generic Framework for 2.3 Forensic in IoT Environment
Network Forensics” the author proposed a model The IoT Forensics is also one of the
of the network forensics investigation. This specialized branch in the digital forensics where
proposed model consists of many different stages all the phases discussed deals with the IoT
of network forensics investigation. The figure 1 infrastructure to find facts about the crime
represents the design of network forensics which happened in IoT environment. The IoT Forensics
has nine stages figured [9]. is carried out in the three levels of forensics :
Cloud level forensics, network level forensics,
device level forensics this can be explained in
Figure 2 [1].
383
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7(4): 382-390
The Society of Digital Information and Wireless Communications (SDIWC), 2018 ISSN: 2305-001
Device level forensics : At this level, a The conventional tools and technologies are
forensic investigator needs to collect data first not deliberated completely to bring out forensic
from the local memory contained in the IoT in the IoT environment as it faces many
device to be analyzed. It is necessary to use challenges [11]. In this part, we will recognize
the IoT device that is missed in analyzing data the challenges we are facing for the forensic
on the forensic level device. investigation in the IoT environment [1].
Network level forensics : To detect various a. Compromised device identification in IoT.
sources of attacks can be identified from The criminal. For e.g., there are number of
network traffic logs. Thus, the log traffic devices in the college and if any of the devices
network can be very important to determine gets compromised and gets breach on the
the guilt or freedom of the suspect. IoT network and extract some of the personal files it
infrastructure includes various forms of will be very hard to find the source of the device
networks, such as Body Area Networks which got infected. This challenge is like finding
(BAN), Personal Area Networks (PAN), the needle in the haystack.
Home / Hospital Area Networks (HAN), b. Gathering and analysis of data.
Local Area Networks (LAN) and Wide Area After identification there comes the analysis
Networks (WAN). Important evidence and gathering which is quite a challenging task
obtained is collected from one of these to find the piece of evidence. This phase is very
networks so that network forensics. crucial phase and depends on the other phase
Cloud level forensics : Cloud forensics is one also resulting the error to other phase.
of the most important part in the IoT forensic c. Data Organization
domain. Why? Due to the fact that most The IoT devices produce the wide variety of
existing IoT devices have low storage and data makes the collection and analysis stage
computing capacity, data generated from IoT challenging. The proper logs need to be
devices and IoT networks are stored and organized in order to avoid the complication of
processed in the cloud. This is because cloud the data and files.
solvents offer a variety of advantages d. Preservation of Evidence
including convenience, large capacity, The last step of the forensic investigation is
scalability, and accessibility on request. that the forensic examiner presents information
that has been analyzed and use as digital
We seen that how the IoT Forensics evidence in front of the court of law. As in
environment works and the three level of comparison, giving traditional forensic evidence
forensics needs to be carried out in the IoT is easy than IoT Environmental forensics
scenario to find out the actual source of the becouse it is a challenging task as the jury
infected device or the network breach[1]. Here in members don’t have enough knowledge as
this section we will do the comparison of the compared to the technical person.
different parameters how the how the actual
system works and how the proposed solution is 2.4 Attacks in IoT
to be carried out [10]. Over time, the domain of security Attacks
on IoT devices is growing rapidly. The attacks
on IoT Systems are summarized in the following
figure 2 [12].
Attack on IoT Device
- Virus
- Timing Analysis - Trojan Horse
- Power Analysis - Logic Bombs
- Fault Analysis - Worms
- Electromagnetic Analysis - Denial of Service
Table 1. Comparison of Traditional and IoT Forensics Figure 3. Attacks on IoT Device
384
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7(4): 382-390
The Society of Digital Information and Wireless Communications (SDIWC), 2018 ISSN: 2305-001
Various microprocessors and controllers are out it. Basically, bluetooth HC-05 can only be
used to design arduino boards. Set digital and configured as slave can not be used as master.
analog input / output (I / O) pins to complement Here is the physical form of bluetooth HC-05 :
the Arduino board which can be connected to
various extension boards or Breadboards
(shields) and other circuits. Arduino boards
display serial communication interfaces,
including Universal Serial Bus (USB) on several
models, and are also used to create programs
from personal computers.
The arduino platform consists of arduino
board, shield, arduino programming language,
and arduino development environment. Arduino
board usually has a basic chip ATmel AVR
microcontroller ATmega8 following derivatives.
The simplified arduino board diagram is shown Figure 6. The physical shape of bluetooth HC 05
in Figure 3. Shield is a board that can be
mounted on the arduino board to increase the 3. METHODOLOGY
ability of the arduino board. 3.1 Bluetooth Arduino Configuration Scheme
Preparing arduino package which is the main
package needed in the system, the package used
is arduino driver package that can be installed
directly. Configuring arduino with Bluetooth Hc-
05 is a preliminary configuration for the purpose
of detecting and analyzing Traffic log file data
contained in arduino. Here is the Arduino
configuration scheme with Bluetooth HC-05 :
Attacker 1
IoT Device
Attacker 2
VICTIM
Arduino UNO Bluetooth
Figure 10. IoT Device Forensics
Attacker 3
B. Model Process Forensic
Figure 8. Simulation Flooding Attack Level Forensic Device on device inspection,
network forensics to analyze and record traffic.
4. IMPLEMENTATION AND RESULT IoT devices will produce very large data. And do
Phase implementation on network forensic to add up the data network. Because the amount
research is in the design of forensic network of data evidence will be very large and it will be
architecture such as the image shown in Figure very difficult to analyze data and it is difficult to
9. Which is the forensic architecture of the identify evidence that can be used to identify
network on the IoT device on detecting flooding digital forensics in finding flood attacks and
387
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7(4): 382-390
The Society of Digital Information and Wireless Communications (SDIWC), 2018 ISSN: 2305-001
Monitoring
Phase
Abnormal No
Activity
Figure 13. Hash Evidence of Log Traffic
Yes
Examination
Star Collecting data traffic log
identified Start Storing Forensic investigators in examining the log
the Findings
file found on the traffic log of bluetooth in the
Figure 11. Detection of Findings Log capture (p.cap) by entering parameters to be
plugged. The examination process is going
Incident Response capturing traffic with wireshark application.
In this phase, The response to the illegal act
or seizure detected is initiated based on the Analysis
information collected to validate and evaluate the At this stage of the analysis of log files will
incident. The response starts up turns on the type be checked, the log files that have been
of attack identified and is guided by organization recovered will be examination one by one to
policy, legal and business. This phase is relevant determine changes in the network and to see a
only to cases where an investigation begins timestamp. Flooding attacks will be visible when
while the attack is underway and not notitia the request to the IoT device increased capture
criminis (after notification of crime). traffic that is an anomaly. Then flooding attacks
388
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7(4): 382-390
The Society of Digital Information and Wireless Communications (SDIWC), 2018 ISSN: 2305-001
are sent from the attacker so that traffic will IP address 192.168.0.221 has a length (length)
increase. In addition to traffic conducted range in the 50s Bytes (57 Bytes). On the
investigator using wireshark to capturing the Internet Protocol Version 4, to read as
traffic, also can be in the graphic user requesting 192.168.0.221 IP source and destination IP
increased in figure 14. address visible 192.168.0.127 with 20 Bytes
header length and the total length of 43. On the
part of the user datagram protocol, source port
reads as 61924 and destination port read as 137.
If the filter is returned to the ip.src ==
168.192.0.221 and investigated in another frame,
the source port is immutable, but still in a great
range (ports 49775-63293). log file analysis
results obtained 3 IP address that has acted
illegally flooding attacks on IoT device.
In addition, the analysis continued with statistics
Figure 14 : IO Graph Traffic Log
module endpoint in Wireshark used to collect
After the log files are recorded, the log file will attack packets contained in log files during the
be taken and analyzed using Wireshark to have attack simulation. In Figure 9 below explains
this forensic evidence. In the picture seen that the IP address has a different load on each
demand exceed 15 packets in one second. As package and at different speeds in each of its
shown in figure 15. bytes.
Presentation
At the presentation stage is the last stage in
Figure 15 : Traffic Log in Wireshark the forensic process model. This stage was the
presentation of all the findings in this study.
Investigation and Attribution Based on the analysis that has been done then
The information obtained from the evidence obtained 3 IP address which becomes the
traces is used to identify of the incident. This findings in this research scenario, as shown in
will help in source traceback, reconstruction of Table 2.
the attack scenario and attribution to a source.
6. CONCLUSION
In this paper we provide different aspects than
those used for IoT and also use IoT devices. The
author has presented a network forensic model
for detecting attacks and identifying attacks.
Here's more about the flooding attack and found
Figure 16 : UDP Follow the infected IoT Bluetooth Arduino device. Log
From the collection of the line can have one line file data with p.cap extension can be analyzed by
to perform analysis on any part of the frame that network forensic investigation using wireshark
represents a frame in an attack packet flooding of application.
389
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7(4): 382-390
The Society of Digital Information and Wireless Communications (SDIWC), 2018 ISSN: 2305-001
Based on the analysis that has been done, it [14] Hachem, S., Teixeira, T. & Issarny, V., 2012.
was found that 3 IP addresses committed illegal Ontologies for the internet of things. Proceedings of
the 8th Middleware Doctoral Symposium on - MDS
actions, which led to overload traffic. By ’11, pp.1–6.
applying a forensic process model, it can be used [15] Huuck, R., 2015. IoT: The Internet of Threats and
to detect flooding attack on IoT devices. Static Program Analysis Defense. EmbeddedWorld
2015: Exibition & Conferences, p.493.
REFERENCES [16] Borgohain, T., Kumar, U. & Sanyal, S., 2015. Survey
[1] Zawoad, Shams, and Ragib Hasan. "FAIoT: of Security and Privacy Issues of Internet of Things.
Towards Building a Forensics Aware Eco System for arXiv preprint arXiv:1501.02211, p.7. Available at :
the Internet of Things." Services Computing (SCC), http://arxiv.org/abs/1501.02211.
2015 IEEE International Conference on. IEEE, 2015. [17] Mualfah, D. and Riadi, I. “Network Forensics For
[2] Hossain, Md Mahmud, Maziar Fotouhi, and Ragib Detecting Flooding Attack On Web Server” (IJCSIS)
Hasan. "Towards an Analysis of Security Issues, International Journal of Computer Science and
Challenges, and Open Problems in the Internet of Information Security, Vol.15, 2017.
Things." Services (SERVICES), 2015 IEEE World [18] Iswardani, A. and Riadi, I. “Denial Of Service Log
Congress on. IEEE, 2015. Analysis Using Density K-Means Method,” vol. 83,
[3] L. Atzori, A. Iera, and G. Morabito, “The internet of no. 2, pp. 299–302, 2016.
things: A survey,” Computer networks, vol. 54, no. [19] Oriwoh, Edewede, and Paul Sant. "The Forensics
15, pp. 2787–2805, 2013. Edge Management System: A Concept and Design."
[4] www.gartner.com, “Gartner Says the Internet of Ubiquitous Intelligence and Computing, 2013 IEEE
Things Will Transform the Data Center,” 10th International Conference on and 10th
http://www.gartner.com/newsroom/id/2684616, International Conference on Autonomic and Trusted
2014. Computing (UIC/ATC). IEEE, 2013.
[5] www.idc.com, “Finding Success in the New IoT [20] Bandyopadhyay, Debasis, and Jaydip Sen. "Internet
Ecosystem: Market to Reach $3.04 Trillion and 30 of things: Applications and challenges in technology
Billion Connected ”Things” in 2020, IDC Says ,” and standardization." Wireless Personal
http://www.idc.com/getdoc.jsp?container Communications 58.1 (2011): 49-69.
Id=prUS25237214, 2014. [21] T. A. Cahyanto and Y. Prayudi, “Web Server Logs
[6] Y. Huang and G. Li, “A semantic analysis for internet Forensic Investigation to Find Attack’s Digital
of things,” in Intelligent Computation Technology Evidence Using Hidden Markov Models Method ,”
and Automation (ICICTA), 2010 International Snati, pp. 15–19, 2014.
Conference on, vol. 1. IEEE, 2010, pp. 336–339. [22] P.F. Moh, P. Yudi & R. Imam, “Comparison of
[7] E.S. Pilli, R.C. Joshi, & R. Niyogi. “A Generic Attribute Based Access Control (ABAC) Model and
Framework for Network Forensics”. International Rule Based Access (RBAC) to Digital Evidence
Journal of Computer Applications (IJCA) (0975 – Storage (DES)” International Journal of Cyber-
8887) Volume 1 – No. 11, 2012. Security and Digital Forensics (IJCSDF) 7(3): 275-
[8] Nguyen, K., Tran, D., Ma., & Shama, D. (2014) An 282, 2018.
Approach to Detect Network Attacks Applied for [23] U. Rusydi, R. Imam & Z.M. Guntur. “Mobile
Network Forensics, 655-660. Forensic Tools Evaluation for Digital Crime
[9] E.S. Pilli, R.C. Joshi, & R. Niyogi. “A Generic Investigation” International Journal on Advanced
Framework for Network Forensics”. International Science Engineering Information Technology, Vol.8-
Journal of Computer Applications (IJCA) (0975 – no.3, 2018.
8887) Volume 1 – No. 11, 2013. [24] K. Ade and R. Imam, “Detection and Analysis Cerber
[10] Oriwoh, Edewede, et al. "Internet of Things Ransomware Based on Network Forensics
Forensics: Challenges and approaches." Behavior”, International Journal of Network
Collaborative Computing: Networking, Applications Security, Vol.20, No.5, PP.836-843, 2017.
and Worksharing (Collaboratecom), 2013 9th
International Conference Conference on. IEEE,
2013.
[11] Buric, J., and D. Delija. "Challenges in Network
forensics." Information and Communication
Technology, Electronics and Microelectronics
(MIPRO), 2015 38th International Convention on.
IEEE, 2015.
[12] Ramjee Prasad, Antonietta Stango, Neeli Prasad &
Sachin Babar.”Proposed Embedded Security
Framework for Internet of Things (IoT)”. 2011.
[13] Atamli, A.W. & Martin, A., “Threat-Based Security
Analysis for the Internet of Things”. International
Workshop on Secure Internet of Things, pp.35–43.
2014
390