首页    期刊浏览 2024年07月09日 星期二
登录注册

文章基本信息

  • 标题:AN INVESTIGATION OF DIGITAL FORENSICS FOR SHAMOON ATTACK BEHAVIOUR IN FOG COMPUTING AND THREAT INTELLIGENCE FOR INCIDENT RESPONSE
  • 本地全文:下载
  • 作者:AHMAD K. Al HWAITAT ; SAHER MANASEER ; RIZIK M. H. Al-SAYYED
  • 期刊名称:Journal of Theoretical and Applied Information Technology
  • 印刷版ISSN:1992-8645
  • 电子版ISSN:1817-3195
  • 出版年度:2020
  • 卷号:98
  • 期号:7
  • 页码:977-990
  • 出版社:Journal of Theoretical and Applied
  • 摘要:Cyber related crimes are increasing nowadays. Thus digital forensics has been employed in solving cybercrimes. Several researches have been done where they have analysed cyber related attacks, malware types, etc. Researches based on studying and analysing Advanced Persistent Threats (APTs), especially Shamoon attack. This research has been done in order to study and analyse the attacking behaviour of Shamoon malware in fog computing using FPSO (Frequency Particles Swarm Optimization) based on Travelling Salesman approach (TSP). In this proposed system, fog nodes are initiated where the nodes delivers three types of data namely industrial, medical and educational data. Secondly Shamoon attack is created followed by distance matrix evaluation. As the Shamoon attack focuses on attacking industrial data, the attack distribution movement focuses mainly on industrial data. After the evaluation, priorities of the particles should be assigned randomly. Once FPSO parameters are initialized, objective function of every particle is evaluated. The FPSO mechanism implements the working procedure of TSP. Under the FPSO mechanism, swap and insertion operations are performed. In order to find the best shortest path, nearest neighbouring algorithm is used, which follows evaluation of fitness function. After evaluation, local best lbest and global best gbest solutions are obtained. Finally, appropriate positions and velocities are updated. From the resultant optimum path, the distribution of Shamoon attack movement can be analysed. The performance of this proposed system has been evaluated by estimating the fitness value, best cost. The attack distribution of Shamoon data has been observed. Then finally a threat intelligence scheme is proposed for the investigating and analysis behaviour and spread of Shamoon attacks in edges of Fog computing.
  • 关键词:Fog Computing;Shamoon Attack;FPSO;TSP;Fitness Estimation ;Digital Forensic;Investigation of Cyber Crimes;Cyber Security.
国家哲学社会科学文献中心版权所有