Term of Award
Master of Science in Applied Engineering (M.S.A.E.)
Document Type and Release Option
Thesis (restricted to Georgia Southern)
Copyright Statement / License for Reuse
This work is licensed under a Creative Commons Attribution 4.0 License.
Jeffrey P. Kaleta
Committee Member 1
Committee Member 2
The rapid growth of internet data makes the digital forensics investigation process challenging. Along with the growth rate, the heterogeneity of data from a variety of devices and components of computer networking make the digital forensics process more complicated. In order to minimize the complexity of this process, a three-layered IoT forensics framework is proposed which includes top, middle, and bottom layers. All the components and devices of different layers of the IoT forensics framework are essential to have valuable information for an investigation. Open source tools are suggested to conduct the digital forensics investigation because of their versatility and ingenuity. The analysis of web proxy log has been conducted. The web proxy log serves as a source of user activity information as well as the resource utilization of the system. This analysis is imperative as a way of knowing the resource usage of a specific network, which establishes a resource allocation plan for the network administrator. A workflow process is proposed to assign the priority to the content type and to allocate bandwidth according to bandwidth consumption ratio to establish a resource allocation plan.
Sadi, Md Baitul Al, "Digital Forensics Framework on IoT Devices and Analysis of Web Proxy Logs to Establish Resource Allocation Plans" (2018). Electronic Theses and Dissertations. 1734.
Research Data and Supplementary Material
Available for download on Tuesday, April 04, 2023