2014 IEEE International Advance Computing Conference (IACC) 2014
DOI: 10.1109/iadcc.2014.6779367
|View full text |Cite
|
Sign up to set email alerts
|

“Role of metadata in forensic analysis of database attacks“

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 8 publications
0
11
0
Order By: Relevance
“…Son [11] presented a model to detect and investigate malicious activities in a database server, which comprises three investigation processes, namely: Server Detection, Data Collection, and Investigation of Data Collected. Extending the detection process model, a four-process investigation model was proposed in [12]. The processes in this model included Collection and Preservation, Analysis of Anti-forensic Attacks, Analysis of Database Attack, and Preserving Evidence Report.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Son [11] presented a model to detect and investigate malicious activities in a database server, which comprises three investigation processes, namely: Server Detection, Data Collection, and Investigation of Data Collected. Extending the detection process model, a four-process investigation model was proposed in [12]. The processes in this model included Collection and Preservation, Analysis of Anti-forensic Attacks, Analysis of Database Attack, and Preserving Evidence Report.…”
Section: Background and Related Workmentioning
confidence: 99%
“…The Collect Suspect Database System proposed in [37] allows investigators to collect and extract suspected database management system data and move it to a secure area for further forensic investigation. The Collection and Preservation process proposed in [12] allows investigators to collect detailed multiple logs of SQL, MySQL and operating systems. The Collection process that was proposed in [38] is used to gather evidence by replicating sources.…”
Section: Database Identificationmentioning
confidence: 99%
“…A rebuilding tool was presented by [53] to rebuild original database schema when databases have been compromised or destroyed. A model to collect, preserve, and analyse database metadata and database attacks was proposed by [42] that consists of four investigation processes: collection and preservation, analysis of anti-forensic attacks, analysis of database attacks, and preserving evidence reports. Additionally, [41] proposed a model to reconstruct database events and detect intruder activities that consisted of two investigation processes: collection and reconstructing evidence.…”
Section: Database Forensic Models Overviewmentioning
confidence: 99%
“…The ''Collect suspect database system'' process proposed by [4] allows investigators to collect and extract suspect database management system data and move it to a secure area for further forensic investigation. The ''Collection and Preservation Process'' proposed by [42] is used to collect log files (database files, transaction logs, cache files, text files, binary log files, error log files, server error logs, and memory dumps,) and protect metadata collected from log files. The ''Collection'' process proposed by [41] is used to gather evidence by replicating investigation sources.…”
Section: ) Redundant and Irrelevant Investigation Processesmentioning
confidence: 99%
“…For example, the following are concepts that are clustered based on similar meaning: “ Reconstructing database” in model [ 23 ]; “ Reconstruction ” in models [ 22 ], [ 3 ], [ 27 ], [ 95 , 96 ]; “ Reconstruction event ” in model [ 60 ]; and “ Reconstructing ” concept in model [ 66 ]. To provide another example, the “ Capture ” concept has been mentioned in three models [ 94 ], [ 97 ], [ 24 ], together with its synonym “ Seizure ” mentioned in the model [ 44 ].…”
Section: 0 Metamodelling Database Forensicsmentioning
confidence: 99%