SoK: Blockchain Solutions for Forensics
- URL: http://arxiv.org/abs/2005.12640v1
- Date: Tue, 26 May 2020 11:43:04 GMT
- Title: SoK: Blockchain Solutions for Forensics
- Authors: Thomas K. Dasaklis and Fran Casino and Constantinos Patsakis
- Abstract summary: This paper provides an overview and classification of the available blockchain-based digital forensic tools.
We also offer an analysis of the various benefits and challenges of the symbiotic relationship between blockchain technology and the current digital forensics approaches.
- Score: 8.185918509343818
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As the digitization of information-intensive processes gains momentum in
nowadays, the concern is growing about how to deal with the ever-growing
problem of cybercrime. To this end, law enforcement officials and security
firms use sophisticated digital forensics techniques for analyzing and
investigating cybercrimes. However, multi-jurisdictional mandates,
interoperability issues, the massive amount of evidence gathered (multimedia,
text etc.) and multiple stakeholders involved (law enforcement agencies,
security firms etc.) are just a few among the various challenges that hinder
the adoption and implementation of sound digital forensics schemes. Blockchain
technology has been recently proposed as a viable solution for developing
robust digital forensics mechanisms. In this paper, we provide an overview and
classification of the available blockchain-based digital forensic tools, and we
further describe their main features. We also offer a thorough analysis of the
various benefits and challenges of the symbiotic relationship between
blockchain technology and the current digital forensics approaches, as proposed
in the available literature. Based on the findings, we identify various
research gaps, and we suggest future research directions that are expected to
be of significant value both for academics and practitioners in the field of
digital forensics.
Related papers
- Blockchain Based Information Security and Privacy Protection: Challenges and Future Directions using Computational Literature Review [1.3864583085700581]
blockchain technology has gained immense popularity in enhancing individual security and privacy.
Rapid proliferation of published research articles presents challenges for manual analysis and synthesis.
We identify 10 topics related to security and privacy and provide a detailed description of each topic.
arXiv Detail & Related papers (2024-09-22T14:41:43Z) - Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques [1.880279363603234]
Despite its advantages, blockchain networks are susceptible to anomalies and frauds, posing significant risks to their integrity and security.
This paper offers a detailed examination of blockchain's key definitions and properties, alongside a thorough analysis of the various anomalies and frauds that undermine these networks.
It describes an array of detection and prevention strategies, encompassing statistical and machine learning methods, game-theoretic solutions, digital forensics, reputation-based systems, and comprehensive risk assessment techniques.
arXiv Detail & Related papers (2024-02-17T09:27:30Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - A Comprehensive Analysis of the Role of Artificial Intelligence and
Machine Learning in Modern Digital Forensics and Incident Response [0.0]
The goal is to look closely at how AI and ML techniques are used in digital forensics and incident response.
This endeavour digs far beneath the surface to unearth the intricate ways AI-driven methodologies are shaping these crucial facets of digital forensics practice.
Ultimately, this paper underscores the significance of AI and ML integration in digital forensics, offering insights into their benefits, drawbacks, and broader implications for tackling modern cyber threats.
arXiv Detail & Related papers (2023-09-13T16:23:53Z) - Forensic Data Analytics for Anomaly Detection in Evolving Networks [13.845204373507016]
Many cybercrimes and attacks have been launched in evolving networks to perform malicious activities.
This chapter presents a digital analytics framework for network anomaly detection.
Experiments on real-world evolving network data show the effectiveness of the proposed forensic data analytics solution.
arXiv Detail & Related papers (2023-08-17T20:09:33Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Combining Blockchain and Biometrics: A Survey on Technical Aspects and a
First Legal Analysis [2.9023633922848586]
This paper provides a survey of technical literature research on the combination of blockchain and biometrics.
It includes a first legal analysis of this integration to shed light on challenges and potentials.
arXiv Detail & Related papers (2023-02-21T18:58:32Z) - Inspect, Understand, Overcome: A Survey of Practical Methods for AI
Safety [54.478842696269304]
The use of deep neural networks (DNNs) in safety-critical applications is challenging due to numerous model-inherent shortcomings.
In recent years, a zoo of state-of-the-art techniques aiming to address these safety concerns has emerged.
Our paper addresses both machine learning experts and safety engineers.
arXiv Detail & Related papers (2021-04-29T09:54:54Z) - Digital Twins: State of the Art Theory and Practice, Challenges, and
Open Research Questions [62.67593386796497]
This work explores the various DT features and current approaches, the shortcomings and reasons behind the delay in the implementation and adoption of digital twin.
The major reasons for this delay are the lack of a universal reference framework, domain dependence, security concerns of shared data, reliance of digital twin on other technologies, and lack of quantitative metrics.
arXiv Detail & Related papers (2020-11-02T19:08:49Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.