Reference Hub7
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

Dennis K. Nilsson, Ulf E. Larson
Copyright: © 2009 |Volume: 1 |Issue: 2 |Pages: 14
ISSN: 1941-6210|EISSN: 1941-6229|ISSN: 1941-6210|EISBN13: 9781615202201|EISSN: 1941-6229|DOI: 10.4018/jdcf.2009040103
Cite Article Cite Article

MLA

Nilsson, Dennis K., and Ulf E. Larson. "Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks." IJDCF vol.1, no.2 2009: pp.28-41. http://doi.org/10.4018/jdcf.2009040103

APA

Nilsson, D. K. & Larson, U. E. (2009). Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks. International Journal of Digital Crime and Forensics (IJDCF), 1(2), 28-41. http://doi.org/10.4018/jdcf.2009040103

Chicago

Nilsson, Dennis K., and Ulf E. Larson. "Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks," International Journal of Digital Crime and Forensics (IJDCF) 1, no.2: 28-41. http://doi.org/10.4018/jdcf.2009040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The introduction of a wireless gateway as an entry point to the automobile in-vehicle network reduces the effort of performing diagnostics and firmware updates considerably. Unfortunately, the same gateway also allows cyber attacks to target the unprotected network which currently lacks proper means for detecting and investigating security-related events. In this article, we discuss how to perform a digital forensic investigation of an in-vehicle network. An analysis of the current features of the network is performed, and an attacker model is developed. Based on the attacker model and a set of generally accepted forensic investigation principles, we derive a list of requirements for detection, data collection, and event reconstruction. We then use the Integrated Digital Investigation Process proposed by Carrier and Spafford (2004) as a template to illustrate how our derived requirements affect an investigation. For each phase of the process, we show the benefits of meeting the requirements and the implications of not complying with them.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.