Database Forensic Investigation Process Models: A Review

被引:17
作者
Al-dhaqm, Arafat [1 ]
Abd Razak, Shukor [1 ]
Othman, Siti Hajar [1 ]
Ali, Abdulalem [1 ]
Ghaleb, Fuad A. [1 ]
Rosman, Arieff Salleh [2 ]
Marni, Nurazmallail [3 ]
机构
[1] UTM, Fac Engn, Sch Comp, Johor Baharu 81310, Malaysia
[2] UTM, Ctr Res Fiqh Sci & Technol, Johor Baharu 81310, Malaysia
[3] UTM, Fac Social Sci & Humanities, Acad Islamic Civilizat, Johor Baharu 81310, Malaysia
关键词
Servers; Database systems; Data models; Digital forensics; Task analysis; Database forensic; digital forensic; investigation process model;
D O I
10.1109/ACCESS.2020.2976885
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Database Forensic Investigation (DBFI) involves the identification, collection, preservation, reconstruction, analysis, and reporting of database incidents. However, it is a heterogeneous, complex, and ambiguous field due to the variety and multidimensional nature of database systems. A small number of DBFI process models have been proposed to solve specific database scenarios using different investigation processes, concepts, activities, and tasks as surveyed in this paper. Specifically, we reviewed 40 proposed DBFI process models for RDBMS in the literature to offer up-to-date and comprehensive background knowledge on existing DBFI process model research, their associated challenges, issues for newcomers, and potential solutions for addressing such issues. This paper highlights three common limitations of the DBFI domain, which are: 1) redundant and irrelevant investigation processes; 2) redundant and irrelevant investigation concepts and terminologies; and 3) a lack of unified models to manage, share, and reuse DBFI knowledge. Also, this paper suggests three solutions for the discovered limitations, which are: 1) propose generic DBFI process/model for the DBFI field; 2) develop a semantic metamodeling language to structure, manage, organize, share, and reuse DBFI knowledge; and 3) develop a repository to store and retrieve DBFI field knowledge.
引用
收藏
页码:48477 / 48490
页数:14
相关论文
共 63 条
[1]   Ideal log setting for database forensics reconstruction [J].
Adedayo, Oluwasola Mary ;
Olivier, Martin S. .
DIGITAL INVESTIGATION, 2015, 12 :27-40
[2]  
Adedayo OM, 2014, IFIP ADV INF COMM TE, V433, P101
[3]  
Ahmed A, 2016, 2016 11TH SYSTEMS OF SYSTEM ENGINEERING CONFERENCE (SOSE), IEEE
[4]  
Al-Dhaqm A, 2018, 2018 IEEE CONFERENCE ON APPLICATION, INFORMATION AND NETWORK SECURITY (AINS 2018), P75, DOI 10.1109/AINS.2018.8631468
[5]   CDBFIP: Common Database Forensic Investigation Processes for Internet of Things [J].
Al-Dhaqm, Arafat ;
Razak, Shukor ;
Othman, Siti Hajar ;
Choo, Kim-Kwang Raymond ;
Glisson, William Bradley ;
Ali, Abdulalem ;
Abrar, Mohammad .
IEEE ACCESS, 2017, 5 :24401-24416
[6]   Development and validation of a Database Forensic Metamodel (DBFM) [J].
Al-dhaqm, Arafat ;
Razak, Shukor ;
Othman, Siti Hajar ;
Ngadi, Asri ;
Ahmed, Mohammed Nazir ;
Mohammed, Abdulalem Ali .
PLOS ONE, 2017, 12 (02)
[7]  
Al-Dhaqm AMR, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P322, DOI 10.1109/ISBAST.2014.7013142
[8]  
[Anonymous], 2014, FORENSIC INVESTIGATI
[9]  
[Anonymous], 2007, TECH REP
[10]  
Azemovi&CENT J., 2009, PROC INT C COMPUT EN, P322