⚠ Official Notice: www.ijisrt.com is the official website of the International Journal of Innovative Science and Research Technology (IJISRT) Journal for research paper submission and publication. Please beware of fake or duplicate websites using the IJISRT name.



Analyse Existing Wireless Network Forensic Techniques and Identify their Limitations in Supporting Effective Cybersecurity Decision-Making


Authors : Mudambi Geoffrey; Davis Matovu; Andrew Lukyamuzi; Semwogere Twaibu; Odongotoo Godfrey; Andrew Alunyu E.

Volume/Issue : Volume 11 - 2026, Issue 4 - April


Google Scholar : https://tinyurl.com/ymswx643

Scribd : https://tinyurl.com/mrx7ymej

DOI : https://doi.org/10.38124/ijisrt/26apr1852

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The rapid growth of wireless communication technologies has significantly increased the complexity and vulnerability of network environments, making them prime targets for sophisticated cyberattacks. Wireless network forensics plays a crucial role in investigating and responding to such incidents; however, existing forensic techniques often fall short in supporting effective and timely cybersecurity decision-making. These limitations include inadequate real-time analysis, poor scalability in handling large volumes of traffic data, limited automation, and insufficient integration with intelligent decision-support systems. This study aims to analyse existing wireless network forensic techniques and identify their limitations while proposing an intelligent traffic analysis framework to enhance cybersecurity decision-making. The research adopts a mixed-methods approach, combining qualitative analysis of current forensic tools and techniques with quantitative evaluation of network traffic datasets. The study further integrates machine learning algorithms and data analytics methods to develop models capable of detecting, classifying, and predicting anomalous network behaviour in wireless environments. The proposed framework emphasizes real-time traffic monitoring, intelligent anomaly detection, and automated forensic analysis to improve the accuracy, speed, and reliability of cyber incident investigations. Experimental results are expected to demonstrate that the integration of intelligent traffic analysis significantly enhances threat detection capabilities, reduces response time, and supports proactive and evidence-based cybersecurity decisions. This research contributes to the field of network forensics by bridging the gap between traditional forensic methods and intelligent analytical approaches. It provides a scalable and adaptive solution tailored to modern wireless network challenges and offers practical recommendations for improving forensic readiness and cybersecurity resilience in dynamic environments.

Keywords : Wireless Network Forensics; Intelligent Traffic Analysis; Cybersecurity Decision-Making; Machine Learning; Anomaly Detection; Network Security; Digital Forensics; Real-Time Monitoring; Intrusion Detection Systems; Data Analytics.

References :

  1. Behl, A., & Behl, K. (2018). Cybersecurity and cyberwar: What everyone needs to know. Oxford University Press.
  2. Conti, M., Dehghantanha, A., Franke, K., & Watson, S. (2018). Internet of Things security and forensics: Challenges and opportunities. Future Generation Computer Systems, 78, 544–546.
  3. Khan, M. A., Salah, K., & Jayaraman, R. (2020). Blockchain-based secure data sharing for Internet of Things. IEEE Access, 8, 109-118.
  4. Sommer, R., & Paxson, V. (2019). Outside the closed world: On using machine learning for network intrusion detection. IEEE Symposium on Security and Privacy.
  5. Kent, K., Chevalier, S., Grance, T., & Dang, H. (2006). Guide to Integrating Forensic Techniques into Incident Response (SP 800-86). NIST.
  6. Zarpelão, B. B., Miani, R. S., Kawakani, C. T., & de Alvarenga, S. C. (2017). A Survey of Intrusion Detection in Internet of Things. Journal of Network and Computer Applications, 84, 25–37.
  7. Humayed, A., Lin, J., Li, F., & Luo, B. (2017). Cyber-Physical Systems Security—A Survey. IEEE Internet of Things Journal, 4(6), 1802–1831.
  8. Ahmed, M., Mahmood, A. N., & Hu, J. (2016). A Survey of Network Anomaly Detection Techniques. Journal of Network and Computer Applications, 60, 19–31.
  9. Adepu, S., & Mathur, A. (2016). Distributed Attack Detection in a Water Treatment Plant. [Cyber-Physical Systems Security]
  10. Stallings, W. (2018). Network Security Essentials: Applications and Standards. [Pearson]
  11. Feng, C., et al. (2017). Multi-layered Intrusion Detection for ICS Using ML. [IEEE Transactions on Industrial Informatics]
  12. Genge, B., & Haller, P. (2016). A cyber-physical attack detection method for industrial control systems. [Computers & Electrical Engineering]
  13. Morris, T., Gao, W. (2013). Industrial control system traffic data sets for intrusion detection research. [Critical Infrastructure Protection]

The rapid growth of wireless communication technologies has significantly increased the complexity and vulnerability of network environments, making them prime targets for sophisticated cyberattacks. Wireless network forensics plays a crucial role in investigating and responding to such incidents; however, existing forensic techniques often fall short in supporting effective and timely cybersecurity decision-making. These limitations include inadequate real-time analysis, poor scalability in handling large volumes of traffic data, limited automation, and insufficient integration with intelligent decision-support systems. This study aims to analyse existing wireless network forensic techniques and identify their limitations while proposing an intelligent traffic analysis framework to enhance cybersecurity decision-making. The research adopts a mixed-methods approach, combining qualitative analysis of current forensic tools and techniques with quantitative evaluation of network traffic datasets. The study further integrates machine learning algorithms and data analytics methods to develop models capable of detecting, classifying, and predicting anomalous network behaviour in wireless environments. The proposed framework emphasizes real-time traffic monitoring, intelligent anomaly detection, and automated forensic analysis to improve the accuracy, speed, and reliability of cyber incident investigations. Experimental results are expected to demonstrate that the integration of intelligent traffic analysis significantly enhances threat detection capabilities, reduces response time, and supports proactive and evidence-based cybersecurity decisions. This research contributes to the field of network forensics by bridging the gap between traditional forensic methods and intelligent analytical approaches. It provides a scalable and adaptive solution tailored to modern wireless network challenges and offers practical recommendations for improving forensic readiness and cybersecurity resilience in dynamic environments.

Keywords : Wireless Network Forensics; Intelligent Traffic Analysis; Cybersecurity Decision-Making; Machine Learning; Anomaly Detection; Network Security; Digital Forensics; Real-Time Monitoring; Intrusion Detection Systems; Data Analytics.

Paper Submission Last Date
31 - May - 2026

SUBMIT YOUR PAPER CALL FOR PAPERS
Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe