Skip to main content

2024 | OriginalPaper | Buchkapitel

6. Advanced Techniques for Digital Evidence Preservation: The Power of Blockchain and Machine Learning

verfasst von : Rizwan Ur Rahman, Deepak Singh Tomar, Gaurav Pramod Kacharea, Meeraj Mahendra Gawde, Tenzin Tsundue, Pavan Kumar, Hamiden Abd El Wahed Khalifa

Erschienen in: Sustainable Security Practices Using Blockchain, Quantum and Post-Quantum Technologies for Real Time Applications

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cybercrime is one of the fastest-growing crimes worldwide, and they are increasing in volume, sophistication, and cost. According to numerous reports such as Cybersecurity Ventures and others it is estimated that every seven seconds, cyber attackers penetrated into Cyber Systems. As a result, one of the essential parts of any system for storing and handling all the events is the log system. However, the system is not robust, and detecting an anomaly in logs has been challenging because of the continuous and ever-changing log events and their mutability property. Attackers attempt to modify the logs in order to avoid being discovered, which extends the time between detection and triage. In this work, we propose a novel model using Blockchain to problem of log analysis by suggesting two modules, anomaly detection using different machine learning models and Distributed Immutable storage system for securely storing the logs. We also present descriptive and user-friendly Web Application by integrating all modules using HTML, CSS, and Flask Framework on the Heroku cloud environment. Using proposed Hybrid Machine Learning Model, we are able to achieve 99.7% accuracy for detecting network anomalies.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, Abdulkadir SJ (2022) Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2):198CrossRef Abdullahi M, Baashar Y, Alhussian H, Alwadain A, Aziz N, Capretz LF, Abdulkadir SJ (2022) Detecting cybersecurity attacks in internet of things using artificial intelligence methods: a systematic literature review. Electronics 11(2):198CrossRef
Zurück zum Zitat Albahar M, Alansari D, Jurcut A (2022) An empirical comparison of pen-testing tools for detecting web app vulnerabilities. Electronics 11(19):2991CrossRef Albahar M, Alansari D, Jurcut A (2022) An empirical comparison of pen-testing tools for detecting web app vulnerabilities. Electronics 11(19):2991CrossRef
Zurück zum Zitat Ambre A, Shekokar N (2015) Insider threat detection using log analysis and event correlation. Proc Comp Sci 45:436–445CrossRef Ambre A, Shekokar N (2015) Insider threat detection using log analysis and event correlation. Proc Comp Sci 45:436–445CrossRef
Zurück zum Zitat Behera A, Panigrahi CR, Pati B (2022) Unstructured log analysis for system anomaly detection—a study. In Advances in Data Science and Management (pp 497–509). Springer Behera A, Panigrahi CR, Pati B (2022) Unstructured log analysis for system anomaly detection—a study. In Advances in Data Science and Management (pp 497–509). Springer
Zurück zum Zitat Bračevac O, Amin N, Salvaneschi G, Erdweg S, Eugster P, Mezini M (2018) Versatile event correlation with algebraic effects. Proceedings of the ACM on Programming Languages, 2(ICFP), pp 1–31 Bračevac O, Amin N, Salvaneschi G, Erdweg S, Eugster P, Mezini M (2018) Versatile event correlation with algebraic effects. Proceedings of the ACM on Programming Languages, 2(ICFP), pp 1–31
Zurück zum Zitat Candel JMO, Gimeno FJM, Mora Mora H (2023) Serverless security analysis for IoT applications. In International Conference on Ubiquitous Computing and Ambient Intelligence (pp 393–400). Springer Candel JMO, Gimeno FJM, Mora Mora H (2023) Serverless security analysis for IoT applications. In International Conference on Ubiquitous Computing and Ambient Intelligence (pp 393–400). Springer
Zurück zum Zitat Catillo M, Pecchia A, Villano U (2022) AutoLog: anomaly detection by deep auto encoding of system logs. Expert Syst Appl 191:116263CrossRef Catillo M, Pecchia A, Villano U (2022) AutoLog: anomaly detection by deep auto encoding of system logs. Expert Syst Appl 191:116263CrossRef
Zurück zum Zitat Chen QX, Chang XH (2022) Resilient filter of nonlinear network systems with dynamic event-triggered mechanism and hybrid cyber attack. Appl Math Comput 434:127419 Chen QX, Chang XH (2022) Resilient filter of nonlinear network systems with dynamic event-triggered mechanism and hybrid cyber attack. Appl Math Comput 434:127419
Zurück zum Zitat Chen Y, Trappe W, Martin RP (2007) Detecting and localizing wireless spoofing attacks. In 2007 4th Annual IEEE Communications Society Conference on sensor, mesh and ad hoc communications and networks (pp 193–202). IEEE Chen Y, Trappe W, Martin RP (2007) Detecting and localizing wireless spoofing attacks. In 2007 4th Annual IEEE Communications Society Conference on sensor, mesh and ad hoc communications and networks (pp 193–202). IEEE
Zurück zum Zitat Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: From network event correlation to incident detection. Comput Secur 48:35–57CrossRef Friedberg I, Skopik F, Settanni G, Fiedler R (2015) Combating advanced persistent threats: From network event correlation to incident detection. Comput Secur 48:35–57CrossRef
Zurück zum Zitat Ghiasi M, Niknam T, Wang Z, Mehrandezh M, Dehghani M, Ghadimi N (2023) A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electric Power Syst Res 215:108975CrossRef Ghiasi M, Niknam T, Wang Z, Mehrandezh M, Dehghani M, Ghadimi N (2023) A comprehensive review of cyber-attacks and defense mechanisms for improving security in smart grid energy systems: past, present and future. Electric Power Syst Res 215:108975CrossRef
Zurück zum Zitat Gill SS, Kumar A, Singh H, Singh M, Kaur K, Usman M, Buyya R (2022) Quantum computing: a taxonomy, systematic review and future directions. Soft Pract Exp 52(1):66–114 Gill SS, Kumar A, Singh H, Singh M, Kaur K, Usman M, Buyya R (2022) Quantum computing: a taxonomy, systematic review and future directions. Soft Pract Exp 52(1):66–114
Zurück zum Zitat Huang W (2019) A blockchain-based framework for secure log storage. In 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET) (pp 96–100). IEEE Huang W (2019) A blockchain-based framework for secure log storage. In 2019 IEEE 2nd International Conference on Computer and Communication Engineering Technology (CCET) (pp 96–100). IEEE
Zurück zum Zitat Jain S, Ahuja NJ, Srikanth P, Bhadane KV, Nagaiah B, Kumar A, Konstantinou C (2021) Blockchain and autonomous vehicles: Recent advances and future directions. IEEE Access 9:130264–130328CrossRef Jain S, Ahuja NJ, Srikanth P, Bhadane KV, Nagaiah B, Kumar A, Konstantinou C (2021) Blockchain and autonomous vehicles: Recent advances and future directions. IEEE Access 9:130264–130328CrossRef
Zurück zum Zitat Jansen BJ (2022) Understanding user-web interactions via web analytics. Springer Nature Jansen BJ (2022) Understanding user-web interactions via web analytics. Springer Nature
Zurück zum Zitat Kiayias A, Zindros D (2020) Proof-of-work sidechains. In Financial Cryptography and Data Security: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers 23 (pp 21–34). Springer International Publishing Kiayias A, Zindros D (2020) Proof-of-work sidechains. In Financial Cryptography and Data Security: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers 23 (pp 21–34). Springer International Publishing
Zurück zum Zitat Kotenko IV, Levshun DS, Chechulin AA (2016) Event correlation in the integrated cyber-physical security system. In 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) (pp 484–486). IEEE Kotenko IV, Levshun DS, Chechulin AA (2016) Event correlation in the integrated cyber-physical security system. In 2016 XIX IEEE International Conference on Soft Computing and Measurements (SCM) (pp 484–486). IEEE
Zurück zum Zitat Landauer M, Skopik F, Wurzenberger M, Hotwagner W, Rauber A (2020) Have it your way: generating customized log datasets with a model-driven simulation testbed. IEEE Transactions on Reliability Landauer M, Skopik F, Wurzenberger M, Hotwagner W, Rauber A (2020) Have it your way: generating customized log datasets with a model-driven simulation testbed. IEEE Transactions on Reliability
Zurück zum Zitat Lathkar M (2021) Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework (English Edition). BPB Publications Lathkar M (2021) Building Web Apps with Python and Flask: Learn to Develop and Deploy Responsive RESTful Web Applications Using Flask Framework (English Edition). BPB Publications
Zurück zum Zitat Li L, Man Y, Chen M (2018) A method of large-scale log pattern mining. In Human Centered Computing: Third International Conference, HCC 2017, Kazan, Russia, August 7–9, 2017, Revised Selected Papers 3 (pp 76–84). Springer International Publishing Li L, Man Y, Chen M (2018) A method of large-scale log pattern mining. In Human Centered Computing: Third International Conference, HCC 2017, Kazan, Russia, August 7–9, 2017, Revised Selected Papers 3 (pp 76–84). Springer International Publishing
Zurück zum Zitat Liashchynskyi P, Liashchynskyi P (2019) Grid search, random search, genetic algorithm: a big comparison for NAS. arXiv preprint arXiv:1912.06059 Liashchynskyi P, Liashchynskyi P (2019) Grid search, random search, genetic algorithm: a big comparison for NAS. arXiv preprint arXiv:​1912.​06059
Zurück zum Zitat Landauer Max, Skopik Florian, Frank Maximilian, Hotwagner Wolfgang, Wurzenberger Markus, Rauber Andreas (2022) AIT Log Data Set V2.0 (v2_0) . Zenodo Landauer Max, Skopik Florian, Frank Maximilian, Hotwagner Wolfgang, Wurzenberger Markus, Rauber Andreas (2022) AIT Log Data Set V2.0 (v2_0) . Zenodo
Zurück zum Zitat Majd M, Najafi P, Alhosseini SA, Cheng F, Meinel C (2022) A comprehensive review of anomaly detection in web logs. In 2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT) (pp 158–165). IEEE Majd M, Najafi P, Alhosseini SA, Cheng F, Meinel C (2022) A comprehensive review of anomaly detection in web logs. In 2022 IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT) (pp 158–165). IEEE
Zurück zum Zitat Mijwil M, Unogwu OJ, Filali Y, Bala I, Al-Shahwani H (2023) Exploring the top five evolving threats in cybersecurity: an in-depth overview. Mesopot J Cybersec 2023:57–63CrossRef Mijwil M, Unogwu OJ, Filali Y, Bala I, Al-Shahwani H (2023) Exploring the top five evolving threats in cybersecurity: an in-depth overview. Mesopot J Cybersec 2023:57–63CrossRef
Zurück zum Zitat Mohan AP, Gladston A (2020) Merkle tree and Blockchain-based cloud data auditing. Int J Cloud Appl Comput (IJCAC) 10(3):54–66 Mohan AP, Gladston A (2020) Merkle tree and Blockchain-based cloud data auditing. Int J Cloud Appl Comput (IJCAC) 10(3):54–66
Zurück zum Zitat Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized business review Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized business review
Zurück zum Zitat Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55–61CrossRef Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55–61CrossRef
Zurück zum Zitat Oprea SV, Bâra A (2021) Machine learning classification algorithms and anomaly detection in conventional meters and Tunisian electricity consumption large datasets. Comput Electr Eng 94:107329CrossRef Oprea SV, Bâra A (2021) Machine learning classification algorithms and anomaly detection in conventional meters and Tunisian electricity consumption large datasets. Comput Electr Eng 94:107329CrossRef
Zurück zum Zitat Pourmajidi W, Miranskyy A (2018) Logchain: blockchain-assisted log storage. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp 978–982) Pourmajidi W, Miranskyy A (2018) Logchain: blockchain-assisted log storage. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD) (pp 978–982)
Zurück zum Zitat Pourmajidi W, Zhang L, Steinbacher J, Erwin T, Miranskyy A (2019) Immutable log storage as a service. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (pp 280–281). IEEE Pourmajidi W, Zhang L, Steinbacher J, Erwin T, Miranskyy A (2019) Immutable log storage as a service. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (pp 280–281). IEEE
Zurück zum Zitat Boldyreva A, Kolesnikov V (Eds.) (2023) Public-Key Cryptography–PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (Vol 13941). Springer Nature Boldyreva A, Kolesnikov V (Eds.) (2023) Public-Key Cryptography–PKC 2023: 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part II (Vol 13941). Springer Nature
Zurück zum Zitat Rahman RU, Sahu DR, Tomar DS (2017) Challenges in securing ESB against web service attacks. In Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm (pp 74–96). IGI Global Rahman RU, Sahu DR, Tomar DS (2017) Challenges in securing ESB against web service attacks. In Exploring Enterprise Service Bus in the Service-Oriented Architecture Paradigm (pp 74–96). IGI Global
Zurück zum Zitat Rahman RU, Wadhwa D, Bali A, Tomar DS (2020) The emerging threats of web scrapping to web applications security and their defense mechanism. In Encyclopedia of Criminal Activities and the Deep Web (pp 788–809). IGI Global Rahman RU, Wadhwa D, Bali A, Tomar DS (2020) The emerging threats of web scrapping to web applications security and their defense mechanism. In Encyclopedia of Criminal Activities and the Deep Web (pp 788–809). IGI Global
Zurück zum Zitat Rahman RU, Verma R, Bansal H, Tomar DS (2020) Classification of spamming attacks to blogging websites and their security techniques. In Encyclopedia of Criminal Activities and the Deep Web (pp. 864–880). IGI Global Rahman RU, Verma R, Bansal H, Tomar DS (2020) Classification of spamming attacks to blogging websites and their security techniques. In Encyclopedia of Criminal Activities and the Deep Web (pp. 864–880). IGI Global
Zurück zum Zitat Reguieg H, Benatallah B, Nezhad HRM, Toumani F (2015) Event correlation analytics: scaling process mining using mapreduce-aware event correlation discovery techniques. IEEE Trans Serv Comput 8(6):847–860CrossRef Reguieg H, Benatallah B, Nezhad HRM, Toumani F (2015) Event correlation analytics: scaling process mining using mapreduce-aware event correlation discovery techniques. IEEE Trans Serv Comput 8(6):847–860CrossRef
Zurück zum Zitat Rout B, Natarajan B (2022) Impact of cyber attacks on distributed compressive sensing based state estimation in power distribution grids. Int J Electr Power Energy Syst 142:108295CrossRef Rout B, Natarajan B (2022) Impact of cyber attacks on distributed compressive sensing based state estimation in power distribution grids. Int J Electr Power Energy Syst 142:108295CrossRef
Zurück zum Zitat Samuel AL (1967) Some studies in machine learning using the game of checkers. II—Recent progress. IBM J Res Devel 11(6):601–617 Samuel AL (1967) Some studies in machine learning using the game of checkers. II—Recent progress. IBM J Res Devel 11(6):601–617
Zurück zum Zitat Schinckus C (2021) Proof-of-work based blockchain technology and Anthropocene: an undermined situation? Renew Sustain Energy Rev 152:111682CrossRef Schinckus C (2021) Proof-of-work based blockchain technology and Anthropocene: an undermined situation? Renew Sustain Energy Rev 152:111682CrossRef
Zurück zum Zitat Simoes V, Maniar H, Abubakar A, Zhao T (2022) Deep learning for multiwell automatic log correction. In SPWLA 63rd Annual Logging Symposium. OnePetro Simoes V, Maniar H, Abubakar A, Zhao T (2022) Deep learning for multiwell automatic log correction. In SPWLA 63rd Annual Logging Symposium. OnePetro
Zurück zum Zitat Wang B, Ying S, Yang Z (2020a) A log-based anomaly detection method with efficient neighbor searching and automatic k neighbor selection. Sci Program 2020:1–17 Wang B, Ying S, Yang Z (2020a) A log-based anomaly detection method with efficient neighbor searching and automatic k neighbor selection. Sci Program 2020:1–17
Zurück zum Zitat Wang J, Tang Y, He S, Zhao C, Sharma PK, Alfarraj O, Tolba A (2020b) LogEvent2vec: log event-to-vector based anomaly detection for large-scale logs in internet of things. Sensors 20(9):2451CrossRef Wang J, Tang Y, He S, Zhao C, Sharma PK, Alfarraj O, Tolba A (2020b) LogEvent2vec: log event-to-vector based anomaly detection for large-scale logs in internet of things. Sensors 20(9):2451CrossRef
Zurück zum Zitat Wang Z, Tian J, Fang H, Chen L, Qin J (2022) LightLog: a lightweight temporal convolutional network for log anomaly detection on the edge. Comput Netw 203:108616CrossRef Wang Z, Tian J, Fang H, Chen L, Qin J (2022) LightLog: a lightweight temporal convolutional network for log anomaly detection on the edge. Comput Netw 203:108616CrossRef
Zurück zum Zitat Wang H, Yang D, Duan N, Guo Y, Zhang L (2018) Medusa: blockchain powered log storage system. In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS) (pp 518–521). IEEE Wang H, Yang D, Duan N, Guo Y, Zhang L (2018) Medusa: blockchain powered log storage system. In 2018 IEEE 9th International Conference on Software Engineering and Service Science (ICSESS) (pp 518–521). IEEE
Zurück zum Zitat Zhang X, Xu Y, Lin Q, Qiao B, Zhang H, Dang Y, Zhang D (2019) Robust log-based anomaly detection on unstable log data. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 807–817) Zhang X, Xu Y, Lin Q, Qiao B, Zhang H, Dang Y, Zhang D (2019) Robust log-based anomaly detection on unstable log data. In Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (pp. 807–817)
Zurück zum Zitat Zhu J, He S, Liu J, He P, Xie Q, Zheng Z, Lyu MR (2019) Tools and benchmarks for automated log parsing. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp 121–130). IEEE Zhu J, He S, Liu J, He P, Xie Q, Zheng Z, Lyu MR (2019) Tools and benchmarks for automated log parsing. In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP) (pp 121–130). IEEE
Metadaten
Titel
Advanced Techniques for Digital Evidence Preservation: The Power of Blockchain and Machine Learning
verfasst von
Rizwan Ur Rahman
Deepak Singh Tomar
Gaurav Pramod Kacharea
Meeraj Mahendra Gawde
Tenzin Tsundue
Pavan Kumar
Hamiden Abd El Wahed Khalifa
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-97-0088-2_6