Figure - uploaded by Nikunj Pansari
Content may be subject to copyright.
Comparative Study of Open Source Digital Forensic Tools

Comparative Study of Open Source Digital Forensic Tools

Source publication
Article
Full-text available
Data Analysis and Investigation using Digital forensics from Digital Storage Devices, is a defined way towards effective data backup strategies, as well as a key aspect in Data Privacy and Confidentiality. Digital storage Devices like Hard Drives (internal or external), USB Drives, floppy disks, etc. provide a good medium for better utilisation and...

Citations

... Security plays a significant role in autonomous driving systems as it is pretty substantial to ensure the safety of the drivers as well as the people not only inside the vehicle but also outside the vehicle due to any mishap, accidents, or security attacks from adversaries, which can be catastrophic at times. Now, security challenges in the autonomous driving system are majorly defined as per the mode of its attack, i.e., physical/sensor-based attacks, cyber-based attacks [28,29], and lastly and the most critical adversarial attacks (Fig. 2.11). In this section, the main emphasis would be only on adversarial attacks. ...
Chapter
In today’s modern and developing world, security and privacy are essential ingredients for ensuring data safety and the legitimate access of one’s information for most of the real-time applications they utilize, be it using smartphones, laptops, tablets, or electronic gadgets which are connected through the Internet thus making it an easy target to leverage the security of that device, resulting in enabling the attackers getting access to the sensitive and confidential data of the individual or organization. With the progression of technology at such a rapid pace, it may be frequent to conclude that drones will be delivering goods and merchandise, thus catering to the accessibility of mobile hotspots and ensuring the security & surveillance of smart cities. Considering the long-term utility of drones for smart cities, there also comes the threat of cyber-attacks like Deauthentication Attacks, GPS Spoofing, etc., which will lead to the disclosure of sensitive information. The smart devices consist of various embedded SoCs (System-On-Chip), which are integrated to sustain a large amount of user data by focusing primarily on avoiding the trade-off between the complexity of the machine learning implemented model and the available compatible edge devices (Hardware SoCs). Thus, it is essential to enhance the security of edge devices on a large scale, specifically from the perspective of smart cities. Several researchers have also proposed methodologies to improve and sustain the security of smart devices using optimized blockchain-based security frameworks using physical parameters like temperature, light, etc. This chapter defines an insight towards ensuring the security (focuses majorly on the Edge computing devices) of the smart devices, which are the prime source to enhance and maximize privacy, thus enabling the smart cities to be more secure from any cyberattack.
... Mainly emphasized to test the shortcomings of packet detection for various IDS connected to the internet for devices in the same network as well as remote network. [5] [20]. ...
... Analysis of Tools [1] [3] [7][20] ...
Conference Paper
The threat of network Trojans looms largely on mission-critical applications. This research work illustrates the generation of fake packets distinct from general conventional network traffic and their detection using tools like Scapy, Snort, and simulation of an IDS (Intrusion Detection System). It caters to the execution of the Payload (packet generation) and its real-time analytical understanding based on MITM (Man-in-the-middle) attack and its illustration using Scapy, Wireshark & Snort, thus utilizing the network analysis techniques. Furthermore, Port Security strategies to mitigate the most vulnerable threats are also defined, and possible DNA cryptographic techniques and state-of-the-art Quantum Cryptography is also explored comprehensively.
Chapter
Full-text available
The unmanned aerial vehicles popularly known as a drone has opened a new paradigm for effectively enhancing and optimizing the network performance for terrestrial wireless networks. The drone can be deployed with a wide range of mission possibilities and can provide service to the terrestrial wireless network on demand. Drone services offered to the wireless network include coverage and capacity enhancements, efficient data dissemination, and on-demand service availability in an infrastructure-less environment. Wireless ad hoc networks can be the major benefactors of drone assistance. Wireless ad hoc networks due to their multi-hop nature are marred by congestion and high latency, which essentially reduces their overall capacity. A drone can enhance the data dissemination scheme of a wireless ad hoc network by providing aerial coverage and line-of-sight connectivity to the terrestrial nodes. The drone deployment as a mobile base station and mobile relay can reduce the latency of ground wireless links and achieve higher packet delivery rates and throughput. This paper discusses the existing models, techniques, and deployment schemes of using an unmanned aerial vehicle to provide services to the terrestrial wireless network. It categorizes the existing schemes into four basic strategies namely, routing, node association, data dissemination, and trajectory optimization of the aerial node. The goal and achievements of the existing methodology together with the open research areas are raised and brought out. This paper puts a spotlight on using UAV-assisted wireless ad hoc networks, the benefits and challenges of this kind of collaboration, and the future trends.
Book
Full-text available
Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats and computer crimes, adaptive and learning techniques for secure estimation and control, decision support systems, fault tolerance and diagnosis, cloud forensics and information systems, and intelligent information retrieval. The book: Discusses computational algorithms for system modeling and optimization in security perspective Focuses on error prediction and fault diagnosis through intelligent information retrieval via wireless technologies Explores a group of practical research problems where security experts can help develop new data-driven methodologies Covers application on artificial intelligence and wireless communication security risk perspective The text is primarily written for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering. The text comprehensively discusses wide range of wireless communication techniques with emerging computational intelligent trends, to help readers understand the role of wireless technologies in applications touching various spheres of human life with the help of hesitant fuzzy sets based computational modeling. It will be a valuable resource for senior undergraduate, graduate students, and researchers in the fields of electrical engineering, electronics and communication engineering, and computer engineering.