2023
DOI: 10.3390/forensicsci3030030
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Microsoft 365 Security: Integrating Digital Forensics Analysis to Detect and Mitigate Adversarial Behavior Patterns

Abstract: This research article investigates the effectiveness of digital forensics analysis (DFA) techniques in identifying patterns and trends in malicious failed login attempts linked to public data breaches or compromised email addresses in Microsoft 365 (M365) environments. Pattern recognition techniques are employed to analyze security logs, revealing insights into negative behavior patterns. The findings contribute to the literature on digital forensics, opposing behavior patterns, and cloud-based cybersecurity. … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

1
10
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(17 citation statements)
references
References 25 publications
1
10
0
Order By: Relevance
“…For instance, predictive models can forecast potential cyberattacks, and understanding the behavioral triggers, drivers, and patterns of cybercriminal behavior could significantly refine these predictions [24]. Similarly, integrating cyberpsychological profiles into digital forensics investigations could enhance accuracy regarding attribution, that is, identifying potential cybercriminals (lone and organized) and understanding respective modus operandi [1,25,26].…”
Section: Knowledge Gapsmentioning
confidence: 99%
See 4 more Smart Citations
“…For instance, predictive models can forecast potential cyberattacks, and understanding the behavioral triggers, drivers, and patterns of cybercriminal behavior could significantly refine these predictions [24]. Similarly, integrating cyberpsychological profiles into digital forensics investigations could enhance accuracy regarding attribution, that is, identifying potential cybercriminals (lone and organized) and understanding respective modus operandi [1,25,26].…”
Section: Knowledge Gapsmentioning
confidence: 99%
“…This synthesis improves accuracy and enriches the understanding of the complex interplay between technological vulnerabilities and human behaviors. The practical application of this approach is evident in scenarios where combined technical and behavioral analyses have successfully preempted sophisticated cyberattacks, demonstrating its efficacy in real-world cybersecurity challenges [3,25].…”
Section: Technical and Behavioral Dimensionsmentioning
confidence: 99%
See 3 more Smart Citations