Skip to main content

Challenges on Digital Cyber-Security and Network Forensics: A Survey

  • Conference paper
  • First Online:
Advances on Intelligent Informatics and Computing (IRICT 2021)

Abstract

There are minimal studies have attempted to shed light on the reality of the challenges and as such, the present paper brings forth studies identifying, quantifying, and prioritizing the challenges to motivate future authors to focus on the issues affecting the domain. Accordingly, a survey was conducted among researchers and practitioners (at the level of law enforcement and organizations) in order to investigate actual challenges and differentiate them from perceived challenges for the purpose of providing insight into the effects upon digital forensic domain in the near future. The study provided and collated a compact survey of the top significant challenges highlighted in the design/development of modern digital forensics tools. The study contributes to the identification of the important, mid- and long-term opportunities and issues that need to be taken into account by the security experts and network forensics in the field investigations fields.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 229.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 299.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973–993 (2014)

    Google Scholar 

  2. Li, L., He, W., Xu, L., Ash, I., Anwar, M., Yuan, X.: Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. Int. J. Inf. Manage. 45, 13–24 (2019)

    Google Scholar 

  3. Kshetri, N.: Blockchain’s roles in strengthening cybersecurity and protecting privacy. Telecommun. Policy 41(10), 1027–1038 (2017)

    Google Scholar 

  4. Internet Security Threats Report. Cybercrime Magazine. https://cybersecurityventures.com/cybercrime-damage-costs-10-trillion-by-2025/. Accessed 13 Nov 2020

  5. https://pcmag.com/article2/0.2817.2392570.00.asp. Accessed June 2013

  6. Ishak, Z., Rajendran, N., Al-Sanjary, O.I., Razali, N.A.M.: Secure biometric lock system for files and applications: a review. In: 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 23–28. IEEE , February 2020

    Google Scholar 

  7. Mohammed, T.L., Ahmed, A.A., Al-Sanjary, O.I.: KRDOH: kurdish offline handwritten text database. In: 2019 IEEE 7th Conference on Systems, Process and Control (ICSPC), pp. 86–89. IEEE (2019)

    Google Scholar 

  8. Al-Sanjary, O.I., Ibrahim, O.A., Sathasivem, K.: A new approach to optimum steganographic algorithm for secure image. In: 2020 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS), pp. 97–102. IEEE, June 2020

    Google Scholar 

  9. Al-Sanjary, O.I., Ahmed, A.A., Zangana, H.M., Ali, M., Aldulaimi, S., Alkawaz, M.: An investigation of the characteristics and performance of hybrid routing protocol in (MANET). Int. J. Eng. Technol. 7(4.22), 49–54 (2018)

    Google Scholar 

  10. Iannacone, M., et al.: Developing an ontology for cyber security knowledge graphs. In: Proceedings of the 10th Annual Cyber and Information Security Research Conference, pp. 1–4, April 2015

    Google Scholar 

  11. Takahashi, T., Kadobayashi, Y.: Reference ontology for cybersecurity operational information. Comput. J. 58(10), 2297–2312 (2015)

    Google Scholar 

  12. Khairkar, A.D., Kshirsagar, D.D., Kumar, S.: Ontology for detection of web attacks. In: 2013 International Conference on Communication Systems and Network Technologies, pp. 612–615. IEEE, April 2013

    Google Scholar 

  13. Ahmed, A.A., Hasan, H.R., Hameed, F.A., Al-Sanjary, O.I.: Writer identification on multi-script handwritten using optimum features. Kurdistan J. Appl. Res. 2(3), 178–185 (2017)

    Google Scholar 

  14. Nasr, M., Shokri, R., Houmansadr, A.: Comprehensive privacy analysis of deep learning: passive and active white-box inference attacks against centralized and federated learning. In: 2019 IEEE symposium on security and privacy (SP), pp. 739–753. IEEE, May 2019

    Google Scholar 

  15. Tari Schreider, S.S.C.P., CISM, C., CISO, I.: Building Effective Cybersecurity Programs: A Security Manager’s Handbook. Rothstein Publishing (2017)

    Google Scholar 

  16. Zissis, D., Lekkas, D.: Addressing cloud computing security issues. Futur. Gener. Comput. Syst. 28(3), 583–592 (2012)

    Google Scholar 

  17. Corbet, S., Meegan, A., Larkin, C., Lucey, B., Yarovaya, L.: Exploring the dynamic relationships between cryptocurrencies and other financial assets. Econ. Lett. 165, 28–33 (2018)

    Google Scholar 

  18. Yusta, J.M., Correa, G.J., Lacal-Arántegui, R.: Methodologies and applications for critical infrastructure protection: state-of-the-art. Energy Policy 39(10), 6100–6119 (2011)

    Google Scholar 

  19. Stinson, D.R., Paterson, M.: Cryptography: Theory and Practice. CRC Press (2018)

    MATH  Google Scholar 

  20. Butkovic, A., Mrdovic, S., Uludag, S., Tanovic, A.: Geographic profiling for serial cybercrime investigation. Digit. Investig. 28, 176–182 (2019)

    Google Scholar 

  21. Kim, Y.G.: Deception tree model for cyber operation. In: 2019 International Conference on Platform Technology and Service (PlatCon), pp. 1–4. IEEE , January 2019

    Google Scholar 

  22. Alguliyev, R., Imamverdiyev, Y., Sukhostat, L.: Cyber-physical systems and their security issues. Comput. Ind. 100, 212–223 (2018)

    Google Scholar 

  23. Mavroeidis, V., Bromander, S.: Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence. In: 2017 European Intelligence and Security Informatics Conference (EISIC), pp. 91–98. IEEE (2017)

    Google Scholar 

  24. Kaiser, R.: The birth of cyberwar. Polit. Geogr. 46, 11–20 (2015)

    Google Scholar 

  25. Shukla, J.B., Singh, G., Shukla, P., Tripathi, A.: Modeling and analysis of the effects of antivirus software on an infected computer network. Appl. Math. Comput. 227, 11–18 (2014)

    MATH  Google Scholar 

  26. Tynes, B., Reynolds, L., Greenfield, P.M.:Adolescence, race, and ethnicity on the Internet: a comparison of discourse in monitored vs. unmonitored chat rooms. J. Appl. Dev. Psychol. 25(6), 667–684 (2004)

    Google Scholar 

  27. Kandukuri, B.R., Rakshit, A.: Cloud security issues. In: 2009 IEEE International Conference on Services Computing, pp. 517–520 (2009)

    Google Scholar 

  28. Eskandari, S., Leoutsarakos, A., Mursch, T., Clark, J.: A first look at browser-based cryptojacking. In: 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 58–66 (2018)

    Google Scholar 

  29. Slonje, R., Smith, P.K., Frisén, A.: The nature of cyberbullying, and strategies for prevention. Comput. Hum. Behav. 29(1), 26–32 (2013)

    Google Scholar 

  30. Harn, L.: Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEEE Proc. Comput. Digit. Tech. 141(5), 307–313 (1994)

    MATH  Google Scholar 

  31. Chowdhary, A., Dixit, V.H., Tiwari, N., Kyung, S., Huang, D., Ahn, G.J.: Science DMZ: SDN based secured cloud testbed. In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 1–2. IEEE, November 2017

    Google Scholar 

  32. Cheddad, A., Condell, J., Curran, K., Mc Kevitt, P.: Digital image steganography: survey and analysis of current methods. Signal Process. 90(3), 727–752 (2010)

    MATH  Google Scholar 

  33. Schneier, B.: The future of incident response. IEEE Secur. Priv. 12(5), 96 (2014)

    Google Scholar 

  34. Miller, D.R., Harris, S., Harper, A., VanDyke, S., Blask, C.: Security Information and Event Management (SIEM) Implementation. McGraw Hill Professional (2010)

    Google Scholar 

  35. Karatzogianni, A.: The Politics of Cyberconflict. Routledge (2006)

    Google Scholar 

  36. Hoffman, R.R., Lee, J.D., Woods, D.D., Shadbolt, N., Miller, J., Bradshaw, J.M.: The dynamics of trust in cyberdomains. IEEE Intell. Syst. 24(6), 5–11 (2009)

    Google Scholar 

  37. Hazelwood, S.D., Koon-Magnin, S.: Cyber stalking and cyber harassment legislation in the United States: a qualitative analysis. Int. J. Cyber Criminol. 7(2), 155–168 (2013)

    Google Scholar 

  38. Li, Q., Clark, G.: Mobile security: a look ahead. IEEE Secur. Priv. 11(1), 78–81 (2013)

    Google Scholar 

  39. Kirschen, D.S., Jayaweera, D.: Comparison of risk-based and deterministic security assessments. IET Gener. Transm. Distrib. 1(4), 527–533 (2007)

    Google Scholar 

  40. Stamm, M.C., Liu, K.R.: Anti-forensics of digital image compression. IEEE Trans. Inf. Forensics Secur. 6(3), 1050–1065 (2011)

    Google Scholar 

  41. Biddle, P., England, P., Peinado, M., Willman, B.: The darknet and the future of content protection. In: Feigenbaum, J. (eds) Digital Rights Management. DRM 2002. Lecture Notes in Computer Science, vol. 2696, pp. 155–176 Springer, Berlin, Heidelberg (2002). https://doi.org/10.1007/978-3-540-44993-5_10

  42. Stamm, M.C., Lin, W.S., Liu, K.R.: Forensics vs. anti-forensics: a decision and game theoretic framework. In: 2012 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 1749–1752. IEEE, March 2012

    Google Scholar 

  43. Liao, K., Zh, Z., Do, A., Ahn, G.J.: Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin. In: 2016 APWG Symposium on Electronic Crime Research (eCrime) p. 113 (2016)

    Google Scholar 

  44. von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: using hard AI problems for security. In: Biham, E. (eds) Advances in Cryptology — EUROCRYPT 2003. EUROCRYPT 2003. Lecture Notes in Computer Science, vol. 2656, pp. 294–311. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39200-9_18

  45. Dagon, D. et al.: HoneyStat: local worm detection using honeypots. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) Recent Advances in Intrusion Detection. RAID 2004. Lecture Notes in Computer Science, vol. 3224. Springer, Berlin, Heidelberg, pp. 39–58 (2004). https://doi.org/10.1007/978-3-540-30143-1_3

  46. Mohanta, B.K., Jena, D., Panda, S.S., Sobhanayak, S.: Blockchain technology: a survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)

    Google Scholar 

  47. Cox, I.J., Miller, M.L., Bloom, J.A., Honsinger, C.: Digital Watermarking, vol. 53. Morgan Kaufmann, San Francisco (2002)

    Google Scholar 

  48. Xiao, L., Wan, X., Lu, X., Zhang, Y., Wu, D.: IoT security techniques based on machine learning: How do IoT devices use AI to enhance security? IEEE Sign. Process. Mag. 35(5), 41–49 (2018)

    Google Scholar 

  49. Ghazinour, K., Matwin, S., Sokolova, M.: YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks (2016). arXiv preprint arXiv:1602.01937

    Google Scholar 

  50. Mercer, J.D.: Cybersquatting: Blackmail on the information superhighway. BUJ Sci. Tech. L. 6, 290 (2000)

    Google Scholar 

  51. Clark, J.F.: Growing threat: Sextortion. US Att’ys Bull 64, 41 (2016)

    Google Scholar 

  52. Jaishankar, K.: Cyber criminology as an academic discipline: history, contribution and impact. Int. J. Cyber Criminol. 12(1), 1–8 (2018)

    Google Scholar 

  53. Crosston, M.D.: World gone cyber MAD: how mutually assured debilitation is the best hope for cyber deterrence. Strat. Stud. Q. 5(1), 100–116 (2011)

    Google Scholar 

  54. Krippendorff, K.: The cybernetics of design and the design of cybernetics. In: Fischer, T., Herr, C. (eds.) Design Cybernetics. Design Research Foundations. Springer, Cham. pp. 119–136 (2019). https://doi.org/10.1007/978-3-030-18557-2_6

  55. Ibarra, J., Jahankhani, H., Kendzierskyj, S.: Cyber-physical attacks and the value of healthcare data: facing an era of cyber extortion and organised crime. In: Jahankhani, H., Kendzierskyj, S., Jamal, A., Epiphaniou, G., Al-Khateeb, H. (eds.) Blockchain and Clinical Trial. Advanced Sciences and Technologies for Security Applications, pp. 115–137. Springer, Cham. https://doi.org/10.1007/978-3-030-11289-9_5

  56. Denning, D.E.: Activism, hacktivism, and cyberterrorism: the Internet as a tool for influencing foreign policy. Netw. Netwars Future Terror Crime Milit. 239, 288 (2001)

    Google Scholar 

  57. Spagnolli, A., Bracken, C.C., Orso, V.: The role played by the concept of presence in validating the efficacy of a cybertherapy treatment: a literature review. Virt. Real. 18(1), 13–36 (2014)

    Google Scholar 

  58. Van Laer, T.: The means to justify the end: combating cyber harassment in social media. J. Bus. Ethics 123(1), 85–98 (2014)

    Google Scholar 

  59. Young, A.L., Yung, M.: Cryptovirology: the birth, neglect, and explosion of ransomware. Commun. ACM 60(7), 24–26 (2017)

    Google Scholar 

  60. Vandaele, K., van der Velden, S., Dribbusch, H., Lyddon, D., Vandaele, K.: From the Seventies Strike Wave to the First Cyber-Strike in the Twenty-First Century, pp. 196–205. Aksant, Amsterdam (2007)

    Google Scholar 

  61. Wimmer, J.: Digital game culture(s) as prototype(s) of mediatization and commercialization of society: the world cyber games 2008 in cologne as an example. In: Fromme, J., Unger, A. (eds.) Computer Games and New Media Cultures. Springer, Dordrecht, pp. 525–540 (2012) . https://doi.org/10.1007/978-94-007-2777-9_33

  62. Pusey, P., Sadera, W.A.: Cyberethics, cybersafety, and cybersecurity: preservice teacher knowledge, preparedness, and the need for teacher education to make a difference. J. Digit. Learn. Teach. Educ. 28(2), 82–85 (2011)

    Google Scholar 

  63. Kandula, S., Katabi, D., Jacob, M., Berger, A.: Botz-4-sale: Surviving organized DDoS attacks that mimic flash crowds. In: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2, pp. 287–300 (2005)

    Google Scholar 

  64. Leukfeldt, E.R., Kleemans, E.R., Stol, W.P.: Cybercriminal networks, social ties and online forums: social ties versus digital ties within phishing and malware networks. Br. J. Criminol. 57(3), 704–722 (2017)

    Google Scholar 

  65. Al-Sanjary, O.I., Ahmed, A.A., Sulong, G.: Development of a video tampering dataset for forensic investigation. Forensic Sci. Int. 266, 565–572 (2016)

    Google Scholar 

  66. Suo, H., Liu, Z., Wan, J., Zhou, K.: Security and privacy in mobile cloud computing. In: 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 655–659. IEEE (2013)

    Google Scholar 

  67. Sun, X., Dai, J., Liu, P., Singhal, A., Yen, J.: Using Bayesian networks for probabilistic identification of zero-day attack paths. IEEE Trans. Inf. Forensics Secur. 13(10), 2506–2521 (2018)

    Google Scholar 

  68. Lee, I., Jeong, S., Yeo, S., Moon, J.: A novel method for SQL injection attack detection based on removing SQL query attribute values. Math. Comput. Model. 55(1–2), 58–68 (2012)

    MathSciNet  MATH  Google Scholar 

  69. Abbas, S., Merabti, M., Llewellyn-Jones, D., Kifayat, K.: Lightweight sybil attack detection in manets. IEEE Syst. J. 7(2), 236–248 (2012)

    Google Scholar 

  70. Salehi, S.A., Razzaque, M.A., Naraei, P., Farrokhtala, A.: Detection of sinkhole attack in wireless sensor networks. In: 2013 IEEE international conference on space science and communication (IconSpace) , pp. 361–365. IEEE, July 2013

    Google Scholar 

  71. Shi, Y., Sagduyu, Y.E., Erpek, T., Davaslioglu, K., Lu, Z., Li, J.H.: Adversarial deep learning for cognitive radio security: jamming attack and defense strategies. In: 2018 IEEE international conference on communications workshops (ICC Workshops), pp. 1–6. IEEE (2018)

    Google Scholar 

  72. Shorey, T., Subbaiah, D., Goyal, A., Sakxena, A., Mishra, A.K.: Performance comparison and analysis of slowloris, goldeneye and xerxes ddos attack tools. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 318–322. IEEE (2018)

    Google Scholar 

  73. Peltier, T.R.: Implementing an information security awareness program. Inf. Secur. J. A Glob. Perspect. 14(2), 37–49 (2005)

    Google Scholar 

  74. Kao, D.-Y.: Cybercrime investigation countermeasure using created-accessed-modified model in cloud computing environments. J. Supercomput. 72(1), 141–160 (2015). https://doi.org/10.1007/s11227-015-1516-7

    Article  Google Scholar 

  75. Al-Sanjary, O.I., Ghazali, N., Ahmed, A.A., Sulong, G.: Semi-automatic methods in video forgery detection based on multi-view dimension. In: Saeed, F., Gazem, N., Patnaik, S., Saed Balaid, A.S., Mohammed, F. (eds.) IRICT 2017. LNDECT, vol. 5, pp. 378–388. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-59427-9_41

    Chapter  Google Scholar 

  76. Ahmed, A.A., Al-Sanjary, O.I., Kaeswaren, S.: Reserve parking and authentication of guest using QR Code. In: 2020 IEEE International Conference on Automatic Control and Intelligent Systems (I2CACIS), pp. 103–106. IEEE (2020)

    Google Scholar 

  77. Casey, E.: Handbook of Digital Forensics and Investigation. Academic Press (2009)

    Google Scholar 

  78. Ciardhuáin, S.Ó.: An extended model of cybercrime investigations. Int. J. Digit. Evid. 3(1), 1–22 (2004)

    Google Scholar 

  79. Abushahma, R.I.H., Ali, M.A., Al-Sanjary, O.I., Tahir, N.M.: Region-based convolutional neural network as object detection in images. In: 2019 IEEE 7th Conference on Systems, Process and Control (ICSPC), pp. 264–268. IEEE (2019)

    Google Scholar 

  80. Reust, J., Friedburg, S.: DFRWS 2005 Workshop Report. http://www.dfrws.org/2005/download/2005final.Pdf (2006)

    Google Scholar 

  81. Al-Sanjary, O.I., et al.: Deleting object in video copy-move forgery detection based on optical flow concept. In: 2018 IEEE Conference on Systems, Process and Control (ICSPC), pp. 33–38. IEEE (2018)

    Google Scholar 

  82. Al-Sanjary, O.I., Sulong, G.: Detection of video forgery: a review of literature. J. Theor. Appl. Inf. Technol. 74(2) (2015)

    Google Scholar 

  83. Al-Sanjary, O.I., Ahmed, A.A., Jaharadak, A.A.B., Ali, M.A., Zangana, H.M.: Detection clone an object movement using an optical flow approach. In: 2018 IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE), pp. 388–394. IEEE (2018)

    Google Scholar 

  84. Alkawaz, M.H., Steven, S.J., Hajamydeen, A.I.: Detecting phishing website using machine learning. In: 2020 16th IEEE International Colloquium on Signal Processing & Its Applications (CSPA), pp. 111–114 (2020)

    Google Scholar 

  85. Che Hamid, H.E., et al.: Disaster management support model for Malaysia. In: Badioze Zaman, H., et al. (eds) Advances in Visual Informatics. IVIC 2019. LNCS, vol. 11870, pp. 570–581. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34032-2_50

  86. Hajamydeen, A.I., Udzir, N.I.: A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework. Scalable Comput. Pract. Exper. 20(1), 113–160 (2019)

    Google Scholar 

  87. Aidee, N.A.N., Johar, M.G.M., Alkawaz, M.H., Hajamydeen, A.I., Al-Tamimi, M.S.H.: Vulnerability assessment on ethereum based smart contract applications. In: 2021 IEEE International Conference on Automatic Control & Intelligent Systems (I2CACIS), pp. 13–18 (2021)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar Ismael Al-Sanjary .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Al-Sanjary, O.I., Ahmed, A.A., Mohammed, M.N., Aik, K.L.T. (2022). Challenges on Digital Cyber-Security and Network Forensics: A Survey. In: Saeed, F., Mohammed, F., Ghaleb, F. (eds) Advances on Intelligent Informatics and Computing. IRICT 2021. Lecture Notes on Data Engineering and Communications Technologies, vol 127. Springer, Cham. https://doi.org/10.1007/978-3-030-98741-1_43

Download citation

Publish with us

Policies and ethics