dc.contributor.author | Abdullah, Haris Iskandar Mohd | |
dc.contributor.author | Ibrahim, Zul-Azri | |
dc.contributor.author | Rahim, Fiza Abdul | |
dc.contributor.author | Fadzil, Hafizuddin Shahril | |
dc.contributor.author | Nizam, Saiful Amin Sharul | |
dc.contributor.author | Mustaffa, Muhammad Zulhusni | |
dc.date.accessioned | 2021-08-04T11:26:53Z | |
dc.date.available | 2021-08-04T11:26:53Z | |
dc.date.issued | 2021-08-04 | |
dc.identifier.issn | 2210-142X | |
dc.identifier.uri | https://journal.uob.edu.bh:443/handle/123456789/4402 | |
dc.description.abstract | The smart grid has been widely used around the world. The security of this system is debatable among the researchers because this area requiring improvement, in order to reassure the grid, is secured from cyber attacks. However, the malware was found attacking smart grid systems such as Stuxnet, Flames, Triton, etc. Some of them are designed to avoid being tracked by a forensic investigator. The perpetrator use fragility of digital evidence as an advantage to launch an attack on the smart grid without leaving traces. Technology development gives challenges to digital forensic procedures because the data volume is much higher. Thus, the digital forensic procedure needs to be redesign, modify, and improve to capture traces and handle digital evidence. This paper aims to propose a digital forensic procedure to guide investigators to perform the digital forensic investigation, especially in a smart grid environment. We also discussed several suitable tools and techniques in digital forensic investigation to solve the problem or challenges. This study will discuss two examples of cyber attacks and simulate the attack to guide forensic investigators using the proposed digital forensic procedure. Examples of attacks are Distributed Denial of Service and False Data Injection attacks. The paper presents an appropriate methodology and relevant forensic tools to ensure the evidence's integrity during collection and analysis to be used as legal evidence in court. | en_US |
dc.language.iso | en | en_US |
dc.publisher | University of Bahrain | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.subject | Forensic | en_US |
dc.subject | Procedure | en_US |
dc.subject | Process | en_US |
dc.subject | Framework | en_US |
dc.subject | Network Forensic | en_US |
dc.subject | Live Digital Forensic | en_US |
dc.subject | Dead Digital Forensic | en_US |
dc.title | Digital Forensics Investigation Procedures of Smart Grid Environment | en_US |
dc.identifier.doi | https://dx.doi.org/10.12785/ijcds/110186 | |
dc.contributor.authorcountry | Malaysia | en_US |
dc.contributor.authorcountry | Malaysia | en_US |
dc.contributor.authorcountry | Malaysia | en_US |
dc.contributor.authorcountry | Malaysia | en_US |
dc.contributor.authorcountry | Malaysia | en_US |
dc.contributor.authorcountry | Malaysia | en_US |
dc.contributor.authoraffiliation | UNITEN R&D Sdn. Bhd., Kajang, Selangor | en_US |
dc.contributor.authoraffiliation | College of Computing and Informatics, Universiti Tenaga Nasional, Kajang, Selangor, Institute of Informatics and Computing Energy, Universiti Tenaga Nasional, Kajang, Selangor | en_US |
dc.contributor.authoraffiliation | College of Computing and Informatics, Universiti Tenaga Nasional, Kajang, Selangor, Institute of Informatics and Computing Energy, Universiti Tenaga Nasional, Kajang, Selangor | en_US |
dc.contributor.authoraffiliation | UNITEN R&D Sdn. Bhd., Kajang, Selangor | en_US |
dc.contributor.authoraffiliation | UNITEN R&D Sdn. Bhd., Kajang, Selangor | en_US |
dc.contributor.authoraffiliation | UNITEN R&D Sdn. Bhd., Kajang, Selangor | en_US |
dc.source.title | International Journal of Computing and Digital System | en_US |
dc.abbreviatedsourcetitle | IJCDS | en_US |
The following license files are associated with this item: