Term of Award

Spring 2018

Degree Name

Master of Science in Applied Engineering (M.S.A.E.)

Document Type and Release Option

Thesis (restricted to Georgia Southern)

Copyright Statement / License for Reuse

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Committee Chair

Jeffrey P. Kaleta

Committee Member 1

Lei Chen

Committee Member 2

Elizabeth Rasnick


The rapid growth of internet data makes the digital forensics investigation process challenging. Along with the growth rate, the heterogeneity of data from a variety of devices and components of computer networking make the digital forensics process more complicated. In order to minimize the complexity of this process, a three-layered IoT forensics framework is proposed which includes top, middle, and bottom layers. All the components and devices of different layers of the IoT forensics framework are essential to have valuable information for an investigation. Open source tools are suggested to conduct the digital forensics investigation because of their versatility and ingenuity. The analysis of web proxy log has been conducted. The web proxy log serves as a source of user activity information as well as the resource utilization of the system. This analysis is imperative as a way of knowing the resource usage of a specific network, which establishes a resource allocation plan for the network administrator. A workflow process is proposed to assign the priority to the content type and to allocate bandwidth according to bandwidth consumption ratio to establish a resource allocation plan.

Research Data and Supplementary Material