Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness

被引:1
|
作者
Ul Haque, Ehtisham [1 ]
Abbasi, Waseem [2 ]
Murugesan, Sathishkumar [3 ]
Anwar, Muhammad Shahid [4 ]
Khan, Faheem [5 ]
Lee, Youngmoon [6 ]
机构
[1] Muslim Youth Univ, Dept Comp Sci, Islamabad 44000, Pakistan
[2] Super Univ, Dept Comp Sci & IT, Sargodha 40100, Pakistan
[3] Natl Cheng Kung Univ, Dept Mech Engn, Tainan 70101, Taiwan
[4] Gachon Univ, Dept AI & Software, Seongnam Si 13120, South Korea
[5] Gachon Univ, Dept Comp Engn, Seongnam Si 13120, South Korea
[6] Hanyang Univ, Dept Robot, Ansan 15588, South Korea
基金
新加坡国家研究基金会;
关键词
Digital forensics; Law enforcement; Cyberattack; Guidelines; NIST; Training; Software engineering; Cyber forensics; cyber forensic investigation; cyber landscape; cybersecurity; digital evidence; digital forensics; e-crime; incident response; MODEL;
D O I
10.1109/ACCESS.2023.3268529
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Rapid growth in technological criminal activities has drawn worldwide attention to cyber forensics. The objective of a cyber forensics is to provide situation awareness in terms of identification and preservation of digital evidence, extraction of information, and analysis of extracted information to facilitate time-critical decision making. However, Cyber Forensic Investigations (CFIs) still lack significant structure to provide reliable insight into major cyberattack patterns. Data from the Global Cyber Security Index (GCI) show that Pakistan lags far behind in technological and organizational initiatives, posing a threat to its national security. This article focuses on state coordinated CFI infrastructure to mitigate the occurrence of cybercrime challenges. Moreover, a conceptual model is established to address the infrastructure of CFI using policy approach, legal, technical, organizational, capacity building, and cooperative venture. This conceptual model is structured in pillars to simplify the CFI infrastructure. The goal of the study is to provide an empirical foundation for policymakers to develop a comprehensive framework for CFI in the country, and to offer insights and recommendations for improving the infrastructure to better combat cybercrime in Pakistan.
引用
收藏
页码:40049 / 40063
页数:15
相关论文
共 50 条
  • [41] A Role Modeling Based Approach for Cyber Threat Analysis
    Drouot, Bastien
    Golra, Fahad R.
    Champeau, Joel
    MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT, MODELSWARD 2019, 2020, 1161 : 76 - 100
  • [42] Proactive defense model based on cyber threat analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    Fujitsu Scientific and Technical Journal, 2016, 52 (03): : 72 - 77
  • [43] Proactive Defense Model Based on Cyber Threat Analysis
    Osako, Takeshi
    Suzuki, Tomoyoshi
    Iwata, Yoichi
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 72 - 77
  • [44] A Study on a Cyber Threat Intelligence Analysis (CTI) Platform for the Proactive Detection of Cyber Attacks Based on Automated Analysis
    Kim, Byung Ik
    Kim, Nakhyun
    Lee, Seulgi
    Cho, Hyeisun
    Park, Junhyung
    2018 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON18), 2018, : 212 - 215
  • [45] Modeling and Analysis of the Cyber Infrastructure for Vehicle Route Optimization
    Lai, Mingyong
    Yang, Hongming
    Yang, Songping
    Zhao, Junhua
    Xu, Yan
    OPTIMIZATION AND CONTROL TECHNIQUES AND APPLICATIONS, 2014, 86 : 255 - 269
  • [46] Basic Forensic Procedures for Cyber Crime Investigation in Smart Grid Networks
    Kotsiuba, Igor
    Skarga-Bandurova, Inna
    Giannakoulias, Alkiviadis
    Bulda, Oksana
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 4255 - 4264
  • [47] Extending the cyber-attack landscape for SCADA-based critical infrastructure
    Rodofile, Nicholas R.
    Radke, Kenneth
    Foo, Ernest
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2019, 25 : 14 - 35
  • [48] Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime
    Patil, Rachana Y.
    Devane, Satish R.
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2022, 34 (05) : 2031 - 2044
  • [49] Review of Design Elements within Power Infrastructure Cyber-Physical Test Beds as Threat Analysis Environments
    Vaagensmith, Bjorn
    Singh, Vivek Kumar
    Ivans, Robert
    Marino, Daniel L.
    Wickramasinghe, Chathurika S.
    Lehmer, Jacob
    Phillips, Tyler
    Rieger, Craig
    Manic, Milos
    ENERGIES, 2021, 14 (05)
  • [50] XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis
    Arikkat, Dincy R.
    Vinod, P.
    Rehiman, K. A. Rafidha
    Rasheed, Rabeeba Abdul
    Conti, Mauro
    JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (04)