Digital forensics investigation procedures of smart grid environment

Smart grids have been widely used around the world. The security of this system is debatable among the researchers because this area requires an improvement in order to reassure the grid is secured from cyberattacks. However, many malware were found attacking the smart grid systems such as Stuxnet,...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohd. Abdullah, Haris Iskandar, Ibrahim, Zul Azri, Abdul Rahim, Fiza, Fadzil, Hafizuddin Shahril, Sharul Nizam, Saiful Amin, Mustaffa, Muhammad Zulhusni
Format: Article
Language:English
Published: University of Bahrain 2022
Subjects:
Online Access:http://eprints.utm.my/id/eprint/98583/1/FizaAbdulRahim2022_DigitalForensicsInvestigationProcedure.pdf
http://eprints.utm.my/id/eprint/98583/
http://dx.doi.org/10.12785/ijcds/110186
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Smart grids have been widely used around the world. The security of this system is debatable among the researchers because this area requires an improvement in order to reassure the grid is secured from cyberattacks. However, many malware were found attacking the smart grid systems such as Stuxnet, Flames, Triton, etc. Some of them are designed to avoid being tracked by a forensic investigator. The perpetrators used the fragility of digital evidence as an advantage to launch an attack on the smart grid without leaving traces. Technology development gives challenges to digital forensic procedures because the data volume is much higher. Thus, the digital forensic procedure needs to be redesigned, modified, and improved to capture traces and handle digital evidence. This paper aims to propose a digital forensic procedure to guide investigators to perform the digital forensic investigation, especially in a smart grid environment. This paper has discussed several suitable tools and techniques in digital forensic investigation to solve the problem or the challenges. This study discussed two cyberattacks examples and simulated the attack using a testbed to guide forensic investigators based on the proposed digital forensic procedure. Examples of cyberattacks are Distributed Denial of Service and False Data Injection attacks. This paper presented an appropriate methodology and relevant forensic tools to ensure the evidence's integrity during collection and analysis as legal evidence in court.