Submitted:
07 January 2025
Posted:
08 January 2025
Read the latest preprint version here
Abstract
Keywords:
1. Introduction
- Criminal-operated Linux systems (e.g., command-and-control servers).
- Abused or misused Linux systems (e.g., by suspect users)
- Imaged systems (e.g., dead disks)
- Standalone artefacts from Linux distributions
- Raspberry Pi devices running Kali Linux
- Metapackages from other platforms
1.1. Research Motivation
1.2. Research Questions
- RQ1: How do forensic processes differ between conventional computers and IoT Devices such as Raspberry Pi devices?
- RQ2: What are the key differences in terms of meaningful forensics artefacts between conventional computers and IoT Devices?
- RQ3: What are the current challenges and limitations in IoT Forensics and possible best practices to implement to overcome these challenges?
2. Literature Review
- Device Diversity: IoT devices come in various forms, including single-board computers (SBC), sensors, actuators, wearables, smart home appliances, and industrial controllers making the task address the diversity in device types, architectures, communication protocols, and operating systems challenging.
- Data Acquisition: Retrieving data from IoT devices while preserving its integrity and ensuring admissibility in legal proceedings is complex with many challenges such as accessing data stored in volatile memory, retrieving logs and configuration settings, and capturing network traffic.
- Distributed Nature: IoT environments involve numerous geographically distributed devices, making data collection and analysis challenging, especially with real-time data generation.
- Scalability Issues: The vast number of devices and data in IoT systems demands new forensic approaches to efficiently process and analyse large-scale information.
- Heterogeneous Protocols: IoT devices use various communication protocols, requiring forensic experts to understand and analyse diverse and often complex interactions.
- Privacy and Legal Concerns: IoT devices collect sensitive data, raising privacy issues. Forensic investigations must navigate legal frameworks to ensure evidence is admissible without violating privacy rights.
3. Methodology
3.1. Testbed Design
3.2. Dataset Elaboration
3.3. Data Capturing
3.4. Comparative Forensics Analysis
- Tool compatibility: The comparative forensic analysis highlighted several significant differences and challenges between conventional computers and IoT devices. Traditional PCs demonstrated high compatibility with most forensic tools, which facilitated a more robust forensic investigation. In contrast, the Raspberry Pi analysis faced significant limitations due to its ARM architecture, which is not widely supported by many forensic tools.
- Data Retention: Data retention also varied, with PCs retaining extensive logs and system data, allowing for a detailed forensic investigation. The Raspberry Pi, however, had limited storage and logging capabilities, resulting in fewer retrievable forensic artefacts and challenges in performing a thorough analysis.
- Memory Analysis: Memory analysis was another area where differences were evident. While memory analysis on PCs was effective, with tools like Volatility providing detailed data from memory dumps, the Raspberry Pi’s architecture and limited tool support made this process much more challenging, if not impossible.
- Network traffic analysis: Network traffic analysis was consistent across both devices, with Wireshark effectively capturing relevant data. However, the contextual information provided by logs and memory analysis was more detailed for the PC, offering a more comprehensive view of the attacks.
- System Log Analysis: System log analysis further underscored the differences, with PCs offering comprehensive and detailed logs, enabling deeper forensic examinations. In contrast, the Raspberry Pi provided limited logs, restricting the scope of analysis
- File System Snapshots: Finally. while PCs allowed for detailed file system snapshots before and after the attacks, revealing significant changes, the Raspberry Pi’s limited storage capacity resulted in fewer detectable changes, further constraining forensic analysis.
3.4.1. DisPartitions of the File System
3.4.2. MRBF/EFI/Config/Initramfs Files
3.4.3. File System: Boot/EFI Logs
3.4.4. Systemd Boot/Shutdown
3.4.5. Installed Software and System Logbook
3.4.6. Network Log Files
3.4.7. Cache, Swap, and Persisted Data
3.4.8. Other Applications Logging
3.4.9. Volatile Memory (RAM)
4. Research Findings and Discussion
4.1. Key Differences Between PC and Raspberry Pi
4.2. Challenges with Raspberry Pi
4.3. Addressing Research Questions
- Tool Compatibility: Many existing forensic tools are not compatible with the diverse architectures and operating systems used by IoT devices, such as the ARCH architecture in Raspberry Pi.
- Data Retention and Storage: IoT devices typically have limited storage capacity and simplified logging mechanisms, which result in insufficient forensic data retention.
- Live Memory Analysis: Acquiring and analysing live memory from IoT devices is challenging due to tool incompatibility and the technical complexity of configuring existing tools for different architectures.
5. Conclusion and Future Works
Funding
Institutional Review Board Statement
Data Availability Statement
Conflicts of Interest
References
- Wanic, E. and Rowe, N. (2018). Assessing Deterrence Options for Cyber Weapons, in 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 13–18. [CrossRef]
- Torabi, S. , Bou-Harb, E., Assi, C. and Debbabi, M., 2020. A scalable platform for enabling the forensic investigation of exploited IoT devices and their generated unsolicited activities. Forensic Science International: Digital Investigation, 32, p.300922. [CrossRef]
- Kebande, V.R. , 2022. Industrial Internet of Things (IIoT) forensics: The forgotten concept in the race towards industry 4.0. Forensic Science International: Reports, 5, p.100257. [CrossRef]
- Stoyanova, M. , Nikoloudakis, Y., Panagiotakis, S., Pallis, E. and Markakis, E.K., 2020. A survey on the Internet of Things (IoT) forensics: challenges, approaches, and open issues. IEEE Communications Surveys & Tutorials, 22(2), pp.1191-1221. [CrossRef]
- Dunsin, D. , Ghanem, M.C., Ouazzane, K. and Vassilev, V., 2024. A comprehensive analysis of the role of artificial intelligence and machine learning in modern digital forensics and incident response. Forensic Science International: Digital Investigation, 48, p.301675. [CrossRef]
- Cook, M. , Marnerides, A., Johnson, C. and Pezaros, D., 2023. A survey on industrial control system digital forensics: challenges, advances and future directions. IEEE Communications Surveys & Tutorials. [CrossRef]
- Nelufule, N. , Singano, T., Masemola, K., Shadung, D., Nkwe, B., Mokoena, J.2024. An Adaptive Digital Forensic Framework for the Evolving Digital Landscape in Industry 4.0 and 5.0, 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), pp.1686-1693, 2024. [CrossRef]
- Case, A. and Richard III, G.G., 2017. Memory forensics: The path forward. Digital investigation, 20, pp.23-33. [CrossRef]
- Wanic, E. and Rowe, N. (2018). Assessing Deterrence Optinos for Cyber Weapons. in 2018 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 13–18. ttps://doi.org/10.1109/CSCI46756.2018.00011.
- Stoyanova, M. , Nikoloudakis, Y., Panagiotakis, S., Pallis, E. and Markakis, E. K. 2020. A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues’, IEEE Communications Surveys & Tutorials, 22(2), pp. 1191–1221. [CrossRef]
- Cusack, B. Tian, Z. and Kyaw, A.K., 2017. Identifying DOS and DDOS attack origin: IP traceback methods comparison and evaluation for IoT. In Interoperability, Safety and Security in IoT: Second International Conference, InterIoT 2016 and Third International Conference, SaSeIoT 2016, Paris, France, October 26-27, 2016, Revised Selected Papers 2 (pp. 127-138). Springer International Publishing.
- Ghanem, M.C. , Mulvihill, P., Ouazzane, K., Djemai, R. and Dunsin, D., 2023. D2WFP: a novel protocol for forensically identifying, extracting, and analysing deep and dark web browsing activities. Journal of Cybersecurity and Privacy, 3(4), pp.808-829. [CrossRef]
- Ghanem, M.C. , Chen, T.M., Ferrag, M.A. and Kettouche, M.E., 2023. ESASCF: expertise extraction, generalization and reply framework for optimized automation of network security compliance. IEEE Access, 11, pp.129840-129853. [CrossRef]
- Yevdokymenko, M. , Mohamed, E. and Onwuakpa, P. (2017) ’Ethical hacking and penetration testing using Raspberry PI’, in 2017 4th International Scientific-Practical Conference Problems of Info-communications. Science and Technology (PIC S&T), pp. 179–181. [CrossRef]
- Mohd Bakry, B. B. , Bt Adenan, A. R. and Mohd Yussoff, Y. B. (2022) ‘Security Attack on IoT RelatedDevices Using Raspberry Pi and Kali Linux’, in 2022 International Conference on Computer and Drone Applications (IConDA), pp. 40–45. [CrossRef]
- Yudha, F. , Ramadhani, E. and Komaryan, R. M. (2021) ’A Prototype of Portable Digital Forensics Imaging Tools using Raspberry Device’, IOP Conference Series: Materials Science and Engineering, 1077(1), p. 012064. [CrossRef]
- Ghanem, M. , Mouloudi, A. and Mourchid, M., 2015. Towards a scientific research based on semantic web. Procedia Computer Science, 73, pp.328-335. [CrossRef]
- Ghanem, M. , Dawoud, F., Gamal, H., Soliman, E., El-Batt, T. and Sharara, H., 2022, September. FLoBC: A decentralized blockchain-based federated learning framework. In 2022 Fourth International Conference on Blockchain Computing and Applications (BCCA) (pp. 85-92). IEEE. [CrossRef]
- Hamouda, D. , Ferrag, M.A., Benhamida, N., Seridi, H. and Ghanem, M.C., 2024. Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques. Internet of Things, 26, p.101149. [CrossRef]
- Dunsin, D. , Ghanem, M.C., Ouazzane, K. and Vassilev, V., 2024. Reinforcement learning for an efficient and effective malware investigation during cyber Incident response. arXiv:2408.01999. [CrossRef]
- Farzaan, M.A.M. , Ghanem, M.C., El-Hajjar, A. and Ratnayake, D.N., 2024. AI-Enabled System for Efficient and Effective Cyber Incident Detection and Response in Cloud Environments.https://arxiv.org/abs/2404.05602.
- Dunsin, D. , Ghanem, M.C. and Quazzane, K., 2022. The use of artificial intelligence in digital forensics and incident response in a constrained environment. International Journal of Information and Communication Engineering, 16(8), pp.280-285. https://repository.londonmet.ac.uk/8678/.
- Kyaw, A. K. , Chen, Y. and Joseph, J. (2015) ’Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry Pi 2’, in 2015 Second International Conference on Information Security and Cyber Forensics (InfoSec). Cape Town: IEEE, pp. 165–170. [CrossRef]
- Westerlund, O. and Asif, R. (2019) ’Drone Hacking with Raspberry-Pi 3 and WiFi Pineapple: Security and Privacy Threats for the Internet-of-Things’, in 2019 1st International Conference on Unmanned Vehicle Systems-Oman (UVS). Muscat, Oman: IEEE, pp. 1–10. [CrossRef]
- T. Bakhshi. Forensic of Things: Revisiting Digital Forensic Investigations in Internet of Things. 2019 4th International Conference on Emerging Trends in Engineering, Sciences and Technology (ICEEST), Karachi, Pakistan, 2019, pp.1-8. [CrossRef]
- Y. Salem, M. Y. Salem, M. Owda and A. Y. Owda. A Comprehensive Review of Digital Forensics Frameworks for Internet of Things (IoT) Devices. 2023 International Conference on Information Technology (ICIT), Amman, Jordan, 2023, pp. 89-96. [CrossRef]
- Mazhar, M.S. , Saleem, Y., Almogren, A., Arshad, J., Jaffery, M.H., Rehman, A.U., Shafiq, M. and Hamam, H., 2022. Forensic analysis on Internet of Things (IoT) device using machine-to-machine (M2M) framework. Electronics, 11(7), p.1126. [CrossRef]
- Alam M., N. and Kabir, M. S. Forensics in the Internet of Things: Application Specific Investigation Model, Challenges and Future Directions, 2023. 4th International Conference for Emerging Technology (INCET), Belgaum, India, 2023, pp. 1-6. [CrossRef]
- Ho, S.M. and Burmester, M. (2021). Cyber Forensics on Internet of Things: Slicing and Dicing Raspberry Pi. International Journal of Cyber Forensics and Advanced Threat Investigations, 2(1). pp.29–49. [CrossRef]


| Reference | Year | IoT | Digital Forensics | Offensive Security | Technique & Approach |
|---|---|---|---|---|---|
| [9] | 2018 | ✗ | ✔ | ✗ | Evaluation and proposal for strategies to deter cyber attacks, particularly those initiated by nation-states. Differences between Cyber and Conventional Weapons, motivation and objectives of cyber operations, deterrence methods (evaluation and effectiveness) |
| [10] | 2020 | ✔ | ✔ | ✔ | Surveying challenges, approaches, and open issues in the field of IoT forensic, research broadly highlighted differences and similarities between mobile and IoT forensic, and tackled forensic by design and digital forensic as a service (DFaaS). |
| [14] | 2018 | ✔ | ✗ | ✔ | Comprehensive overview of ethical hacking practices, emphasizing the use of low-cost, portable hardware like the Raspberry Pi. Define Ethical Hacking, penetration testing, reconnaissance techniques, and remote penetration testing with the RPI combining theoretical and practical aspects. |
| [15] | 2022 | ✔ | ✔ | ✗ | The article focuses on demonstrating the vulnerability of IoT devices using a Raspberry Pi 4 with Raspberry Pi OS. Attacks with Kali Linux and automated tools are employed highlighting the security concerns associated with IoT devices. The methodology of executing the attacks is discussed emphasising the importance of securing IoT devices to prevent exploitation. |
| [16] | 2021 | ✔ | ✗ | ✔ | The paper focuses on developing a low-cost, and portable digital forensic imaging tool using the RPI. The goal is to create an image that can be used and analysed as affordable evidence. |
| [23] | 2015 | ✔ | ✔ | ✗ | Focus on evaluating and comparing the performance, efficiency, and efficacy of two open-source intrusion detection systems (IDSs) running in the Raspberry Pi 2 (Model B). Aim to determine their suitability for use in cost-sensitive network environments. |
| [24] | 2019 | ✔ | ✔ | ✗ | Identify and exploit vulnerabilities in two commercial drones. Aim to demonstrate the security weakness present in these drones by using the Raspberry Pi as an automated tool to interact with the drones. |
![]() |
| Aspect | PC | Raspberry Pi |
|---|---|---|
| Tool Compatibility | High - Most tools work effectively | Low - Many tools face compatibility issues |
| Data Retention | Extensive logs and system data | Limited logs and storage capacity |
| Memory Analysis | Effective with rich data from memory dumps | Challenging due to tool configuration issues |
| Network Traffic Analysis | Detailed and consistent analysis | Similar results but less contextual data |
| System Log Analysis | Comprehensive and detailed | Limited and less detailed |
| File System Snapshots | Detailed snapshots before and after attacks | Limited changes detected due to small storage |
| Overall Forensic Capability | High - Robust forensic analysis possible | Low - Significant limitations in forensic analysis |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).

