Evaluating forensic log readiness in simulated 6G networks

Syed Rizvi, Bander Alrimy, Nasreen Anjum, Aikaterini Kanta*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Downloads (Pure)

Abstract

The forensic readiness of future 6G networks will depend not only on advanced detection systems but also on maintaining the integrity, availability, and timeliness of the system and event logs. In high-speed, ultra-low-latency environments, the risk of delayed or compromised logs is an issue for incident response and post-incident forensic analysis. This paper evaluates local and remote log collection mechanisms in a simulated 6G network environment. Benign (low intensity) and adversarial (high intensity) traffic was generated to measure log collection performance in a Cisco router and a centralised Linux server. The results show that while log completeness is maintained in both cases, recording local logs on the router can exhibit delays up to 50s (peak delay) under high-intensity traffic, whereas remote logs are unaffected. These findings highlight the trade-off between speed and forensic reliability in high-throughput environments and show the importance of log adaptability to improve forensic readiness in the face of next-generation communication systems.
Original languageEnglish
Title of host publicationProceedings of 2025 IEEE International Conference on Cyber Security and Resilience
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1094-1099
Number of pages6
ISBN (Electronic)9798331535919
ISBN (Print)9798331535926
DOIs
Publication statusPublished - 5 Aug 2025
Event5th IEEE International Conference on Cyber Security and Resilience, CSR 2025 - Chania, Greece
Duration: 4 Aug 20256 Aug 2025

Conference

Conference5th IEEE International Conference on Cyber Security and Resilience, CSR 2025
Country/TerritoryGreece
CityChania
Period4/08/256/08/25

Keywords

  • 6G Networks
  • Log Forensics
  • Network Forensics
  • Forensic Readiness
  • Network Simulator
  • GNS3

Fingerprint

Dive into the research topics of 'Evaluating forensic log readiness in simulated 6G networks'. Together they form a unique fingerprint.

Cite this