Digital Forensics Investigation Procedures of Smart Grid Environment
Smart grids have been widely used around the world. The security of this system is debatable among the researchers because this area requires an improvement in order to reassure the grid is secured from cyberattacks. However, many malware were found attacking the smart grid systems such as Stuxnet,...
Saved in:
Main Authors: | , , , , , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
University of Bahrain
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.uniten.dspace-27214 |
---|---|
record_format |
dspace |
spelling |
my.uniten.dspace-272142023-05-29T17:41:05Z Digital Forensics Investigation Procedures of Smart Grid Environment Abdullah H.I.M. Ibrahim Z.-A. Rahim F.A. Fadzil H.S. Nizam S.A.S. Mustaffa M.Z. 57607963100 57203863738 57350579500 57350813500 57350466100 57220805312 Smart grids have been widely used around the world. The security of this system is debatable among the researchers because this area requires an improvement in order to reassure the grid is secured from cyberattacks. However, many malware were found attacking the smart grid systems such as Stuxnet, Flames, Triton, etc. Some of them are designed to avoid being tracked by a forensic investigator. The perpetrators used the fragility of digital evidence as an advantage to launch an attack on the smart grid without leaving traces. Technology development gives challenges to digital forensic procedures because the data volume is much higher. Thus, the digital forensic procedure needs to be redesigned, modified, and improved to capture traces and handle digital evidence. This paper aims to propose a digital forensic procedure to guide investigators to perform the digital forensic investigation, especially in a smart grid environment. This paper has discussed several suitable tools and techniques in digital forensic investigation to solve the problem or the challenges. This study discussed two cyberattacks examples and simulated the attack using a testbed to guide forensic investigators based on the proposed digital forensic procedure. Examples of cyberattacks are Distributed Denial of Service and False Data Injection attacks. This paper presented an appropriate methodology and relevant forensic tools to ensure the evidence's integrity during collection and analysis as legal evidence in court. � 2022 University of Bahrain. All rights reserved. Final 2023-05-29T09:41:05Z 2023-05-29T09:41:05Z 2022 Article 10.12785/ijcds/110186 2-s2.0-85128584321 https://www.scopus.com/inward/record.uri?eid=2-s2.0-85128584321&doi=10.12785%2fijcds%2f110186&partnerID=40&md5=58ddf341cad691dee6003c21dfd99048 https://irepository.uniten.edu.my/handle/123456789/27214 11 1 1071 1082 All Open Access, Gold University of Bahrain Scopus |
institution |
Universiti Tenaga Nasional |
building |
UNITEN Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Tenaga Nasional |
content_source |
UNITEN Institutional Repository |
url_provider |
http://dspace.uniten.edu.my/ |
description |
Smart grids have been widely used around the world. The security of this system is debatable among the researchers because this area requires an improvement in order to reassure the grid is secured from cyberattacks. However, many malware were found attacking the smart grid systems such as Stuxnet, Flames, Triton, etc. Some of them are designed to avoid being tracked by a forensic investigator. The perpetrators used the fragility of digital evidence as an advantage to launch an attack on the smart grid without leaving traces. Technology development gives challenges to digital forensic procedures because the data volume is much higher. Thus, the digital forensic procedure needs to be redesigned, modified, and improved to capture traces and handle digital evidence. This paper aims to propose a digital forensic procedure to guide investigators to perform the digital forensic investigation, especially in a smart grid environment. This paper has discussed several suitable tools and techniques in digital forensic investigation to solve the problem or the challenges. This study discussed two cyberattacks examples and simulated the attack using a testbed to guide forensic investigators based on the proposed digital forensic procedure. Examples of cyberattacks are Distributed Denial of Service and False Data Injection attacks. This paper presented an appropriate methodology and relevant forensic tools to ensure the evidence's integrity during collection and analysis as legal evidence in court. � 2022 University of Bahrain. All rights reserved. |
author2 |
57607963100 |
author_facet |
57607963100 Abdullah H.I.M. Ibrahim Z.-A. Rahim F.A. Fadzil H.S. Nizam S.A.S. Mustaffa M.Z. |
format |
Article |
author |
Abdullah H.I.M. Ibrahim Z.-A. Rahim F.A. Fadzil H.S. Nizam S.A.S. Mustaffa M.Z. |
spellingShingle |
Abdullah H.I.M. Ibrahim Z.-A. Rahim F.A. Fadzil H.S. Nizam S.A.S. Mustaffa M.Z. Digital Forensics Investigation Procedures of Smart Grid Environment |
author_sort |
Abdullah H.I.M. |
title |
Digital Forensics Investigation Procedures of Smart Grid Environment |
title_short |
Digital Forensics Investigation Procedures of Smart Grid Environment |
title_full |
Digital Forensics Investigation Procedures of Smart Grid Environment |
title_fullStr |
Digital Forensics Investigation Procedures of Smart Grid Environment |
title_full_unstemmed |
Digital Forensics Investigation Procedures of Smart Grid Environment |
title_sort |
digital forensics investigation procedures of smart grid environment |
publisher |
University of Bahrain |
publishDate |
2023 |
_version_ |
1806428443390246912 |
score |
13.222552 |