CDBFIP: Common Database Forensic Investigation Processes for Internet of Things

被引:35
作者
Al-Dhaqm, Arafat [1 ,2 ]
Razak, Shukor [1 ]
Othman, Siti Hajar [1 ]
Choo, Kim-Kwang Raymond [3 ]
Glisson, William Bradley [4 ]
Ali, Abdulalem [1 ]
Abrar, Mohammad [1 ]
机构
[1] Univ Teknol Malaysia, Fac Comp, Dept Comp Sci, Johor Baharu 81310, Malaysia
[2] Aden Community Coll, Dept Comp Sci, Aden 262, Yemen
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[4] Univ S Alabama, Sch Comp, Mobile, AL 36688 USA
来源
IEEE ACCESS | 2017年 / 5卷
关键词
Forensics; database forensics; Internet of Things forensics; SCIENCE; DESIGN;
D O I
10.1109/ACCESS.2017.2762693
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Database forensics is a domain that uses database content and metadata to reveal malicious activities on database systems in an Internet of Things environment. Although the concept of database forensics has been around for a while, the investigation of cybercrime activities and cyber breaches in an Internet of Things environment would benefit from the development of a common investigative standard that unifies the knowledge in the domain. Therefore, this paper proposes common database forensic investigation processes using a design science research approach. The proposed process comprises four phases, namely: 1) identification; 2) artefact collection; 3) artefact analysis; and 4) the documentation and presentation process. It allows the reconciliation of the concepts and terminologies of all common database forensic investigation processes; hence, it facilitates the sharing of knowledge on database forensic investigation among domain newcomers, users, and practitioners.
引用
收藏
页码:24401 / 24416
页数:16
相关论文
共 83 条
[1]   Cloud incident handling and forensic-by-design: cloud storage as a case study [J].
Ab Rahman, Nurul Hidayah ;
Cahyani, Niken Dwi Wahyu ;
Choo, Kim-Kwang Raymond .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14)
[2]  
Ab Rahman NH, 2016, IEEE CLOUD COMPUT, V3, P50, DOI 10.1109/MCC.2016.5
[3]  
Abhonkar P. D., 2012, International Journal of Computer Science and Information Technologies, V3, P5078
[4]  
Adedayo O. M., 2015, TECH REP
[5]   Ideal log setting for database forensics reconstruction [J].
Adedayo, Oluwasola Mary ;
Olivier, Martin S. .
DIGITAL INVESTIGATION, 2015, 12 :27-40
[6]  
Adedayo OluwasolaMary., 2012, International_Conference_on_Digital_Forensics_and Cyber_Crime, P220
[7]   Development and validation of a Database Forensic Metamodel (DBFM) [J].
Al-dhaqm, Arafat ;
Razak, Shukor ;
Othman, Siti Hajar ;
Ngadi, Asri ;
Ahmed, Mohammed Nazir ;
Mohammed, Abdulalem Ali .
PLOS ONE, 2017, 12 (02)
[8]  
Al-Dhaqm AMR, 2014, 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), P322, DOI 10.1109/ISBAST.2014.7013142
[9]  
Aldhaqm A., 2016, Research Journal of Applied Sciences, Engineering and Technology, V12, P386, DOI DOI 10.19026/RJASET.12.2377
[10]  
Ali A., 2017, P INT C REL INF COMM, P141, DOI DOI 10.1007/978-3-319-59427-9_16