Quantifying the need for supervised machine learning in conducting live forensic analysis of emergent configurations (ECO) in IoT environments

Forensic Science International: Reports - Tập 2 - Trang 100122 - 2020
Victor R. Kebande1, Richard A. Ikuesan2, Nickson M. Karie3, Sadi Alawadi1, Kim-Kwang Raymond Choo4, Arafat Al-Dhaqm5
1Department of Computer Science, Malmö University, Sweden
2Cyber and Network Security Department, Science and Technology Division, Community College of Qatar, Qatar
3School of Science, Edith Cowan University, Australia
4Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX 78249-0631, USA
5School of Computing, Faculty of Engineering, Universiti Teknologi Malysia, Johor, Malaysia

Tài liệu tham khảo

Alkhabbas, 2018, Eco-iot: An architectural approach for realizing emergent configurations in the internet of things, European Conference on Software Architecture, 86, 10.1007/978-3-030-00761-4_6 Alkhabbas, 2017, Architecting emergent configurations in the internet of things, 2017 IEEE International Conference on Software Architecture (ICSA), 221, 10.1109/ICSA.2017.37 Alkhabbas, 2017, Emergent configurations in the internet of things as system of systems, 2017 IEEE/ACM Joint 5th International Workshop on Software Engineering for Systems-of-Systems and 11th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems. (JSOS), 70, 10.1109/JSOS.2017.6 Alkhabbas, 2017, A commitment-based approach to realize emergent configurations in the internet of things, 2017 IEEE International Conference on Software Architecture Workshops (ICSAW), 88, 10.1109/ICSAW.2017.55 Alkhabbas, 2016, Iot-based systems of systems, Proceedings of the 2nd edition of Swedish Workshop on the Engineering of Systems of Systems (SWESOS 2016) Wu, 2018, Bot detection using unsupervised machine learning, Microsystem Technologies, 24, 209, 10.1007/s00542-016-3237-0 Beebe, 2007, Digital forensic text string searching: Improving information retrieval effectiveness by thematically clustering search results, Digital Invest., 4, 49, 10.1016/j.diin.2007.06.005 Pajouh, 2016, A two-layer dimension reduction and two-tier classification model for anomaly-based intrusion detection in iot backbone networks, IEEE Transactions on Emerging Topics in Computing Tall’on-Ballesteros, 2014, Data mining methods applied to a digital forensics task for supervised machine learning, Computational Intelligence in Digital Forensics: Forensic Investigation and Applications, 413 Mohlala, 2017, User attribution based on keystroke dynamics in digital forensic readiness process, 2017 IEEE Conference on Application Information Network Security (AINS), 124, 10.1109/AINS.2017.8270436 Adeyemi, 2016, Understanding online behavior: exploring the probability of online personality trait using supervised machine-learning approach, Front. ICT, 3, 8, 10.3389/fict.2016.00008 Huang, 2016, Forensic analysis of distributed computing network based on decision values, 2016 International Symposium on Computer Consumer Control (IS3C), 423, 10.1109/IS3C.2016.113 Buccoli, 2014, Unsupervised feature learning for bootleg detection using deep learning architectures, 2014 IEEE International Workshop on Information Forensics Security (WIFS), 131, 10.1109/WIFS.2014.7084316 Bhide, 2015, i-learning iot: An intelligent self learning system for home automation using iot, 2015 International Conference on Communications and Signal Processing (ICCSP), 1763, 10.1109/ICCSP.2015.7322825 Ham, 2014, Linear svm-based android malware detection for reliable iot services, J. Appl. Math., 2014, 10.1155/2014/594501 Karie, 2019, Diverging deep learning cognitive computing techniques into cyber forensics, Forensic Sci. Int.: Synergy, 1, 61 Khan, 2008 Costantini, 2019, Digital forensics and investigations meet artificial intelligence, Ann. Math. Artif. Intel., 10.1007/s10472-019-09632-y Mitchell, 2010, The use of artificial intelligence in digital forensics: An introduction, Digital Evid. Elec. Signature L. Rev. Ray, 2018, A survey on internet of things architectures, J. King Saud Univ.-Comput. Inform. Sci. Khorashadizadeh, 2019, Generic 5g infrastructure for iot ecosystem, International Conference of Reliable Information and Communication Technology, 451 R.-C. Mihailescu, R. Spalazzese, C. Heyer, and P. Davidsson, A role-based approach for orchestrating emergent configurations in the internet of things, arXiv preprint arXiv:1809.09870 (2018). Kebande, 2016, A generic digital forensic investigation framework for internet of things (iot), 2016 IEEE 4th International Conference on Future Internet of Things Cloud (FiCloud), 356, 10.1109/FiCloud.2016.57 Li, 2019, Iot forensics: Amazon echo as a use case, IEEE Internet Things J., 6, 6487, 10.1109/JIOT.2019.2906946 Zhang, 2020, Iot botnet forensics: A comprehensive digital forensic case study on mirai botnet servers, Forensic Sci. Int.: Digital Invest., 32, 300926 Zhang, 2019 Zhang, 2019, How do i share my iot forensic experience with the broader community?. an automated knowledge sharing iot forensic platform, IEEE Internet of Things J., 6, 6850, 10.1109/JIOT.2019.2912118 Alkadi, 2020, A deep blockchain framework-enabled collaborative intrusion detection for protecting iot and cloud networks, IEEE Internet Things J. Saharkhizan, 2020, An ensemble of deep recurrent neural networks for detecting iot cyber attacks using network traffic, IEEE Internet Things J., 10.1109/JIOT.2020.2996425 Alkhabbas, 2018, Enacting emergent configurations in the iot through domain objects, International Conference on Service-Oriented Computing, 279 Mihailescu, 2016, Towards collaborative sensing using dynamic intelligent virtual sensors, 217 Tegen, 2019, Collaborative sensing with interactive learning using dynamic intelligent virtual sensors, Sensors, 19, 477, 10.3390/s19030477 Keramati, 2014, Improved churn prediction in telecommunication industry using data mining techniques, Appl. Soft Comput., 24, 994, 10.1016/j.asoc.2014.08.041 Cortes, 1995, Support-vector networks, Machine Learn., 20, 273, 10.1007/BF00994018 He, 2005, The inverse problem of support vector machines and its solution, 4322 Liu, 2008, Evaluating the supplier cooperative design ability using a novel support vector machine algorithm, 986 He, 2006, 3503 Dewi, 2017, Improving na”ive bayes performance in single image pap smear using weighted principal component analysis (wpca), 2017 International Conference on Computing, Engineering, and Design (ICCED), 1, 10.1109/CED.2017.8308130 Alfisahrin, 2013, Data mining techniques for optimization of liver disease classification, 379 Breiman, 2001, Random forests, Mach. Learn., 45, 5, 10.1023/A:1010933404324 Garla, 2012, Ontology-guided feature engineering for clinical text classification, J. Biomed. Inform., 45, 992, 10.1016/j.jbi.2012.04.010 Dash, 1997, Feature selection for classification, Intelligent Data Anal., 1, 131, 10.3233/IDA-1997-1302 Narendra, 1977, A branch and bound algorithm for feature subset selection, IEEE Trans. Comput., 917 Hira, 2015, A review of feature selection and feature extraction methods applied on microarray data, Adv. Bioinform., 10.1155/2015/198363 Kira, 1992, The feature selection problem: Traditional methods and a new algorithm, Aaai, Vol. 2, 129 Aksoy, 2001, Feature normalization and likelihood-based similarity measures for image retrieval, Pattern Recognit. Lett., 22, 563, 10.1016/S0167-8655(00)00112-4 Ikuesan, 2020, A heuristics for http traffic identification in measuring user dissimilarity, Human-Intelligent Syst. Integration, 1 Al-Dhaqm, 2020, Categorization and organization of database forensic investigation processes, IEEE Access, 1 Ikuesan, 2019, Polychronicity tendency-based online behavioral signature, Int. J. Machine Learn. Cybernet., 10, 2103, 10.1007/s13042-017-0748-7 Adeyemi, 2016, Observing consistency in online communication patterns for user re-identification, PLOS ONE, 11, e0166930, 10.1371/journal.pone.0166930 Ikuesan, 2019, Digital behavioral-fingerprint for user attribution in digital forensics: Are we there yet?, Digital Invest., 30, 73, 10.1016/j.diin.2019.07.003