2018 International Conference on Information Management and Technology (ICIMTech) 2018
DOI: 10.1109/icimtech.2018.8528177
|View full text |Cite
|
Sign up to set email alerts
|

Five Stages of Database Forensic Analysis: A Systematic Literature Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 15 publications
(14 citation statements)
references
References 14 publications
0
11
0
Order By: Relevance
“…Recently, four investigation processes have been proposed by [26] identification, artifact collection, artifact analysis, and presentation and documentation. Bria [27] proposed five investigation processes, which are database identification, investigation, artefacts collection, analysis, and documentation. These processes have been widely explored in other domains of digital forensics, and have been proven to indeed demonstrate some tendency of overlap [2,3].…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, four investigation processes have been proposed by [26] identification, artifact collection, artifact analysis, and presentation and documentation. Bria [27] proposed five investigation processes, which are database identification, investigation, artefacts collection, analysis, and documentation. These processes have been widely explored in other domains of digital forensics, and have been proven to indeed demonstrate some tendency of overlap [2,3].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Also, the Identification process proposed by [26] is used to prepare a clean database forensic investigation environment and trusted forensic techniques, as well as allow the investigation team to isolate the database server from the network to prevent users from tampering with it, and to capture volatile and non-volatile data. Finally, [27] introduced a Database Identification process useful for defining, identifying, preparing, detecting, and investigating database incidents. This is the initial process of an investigation to find a problem in the database.…”
Section: Phase Iii: Categorization Of the Extracted Database Forensicmentioning
confidence: 99%
“…Also, the Identification process proposed by [43] is used to prepare a clean database forensic investigation environment and trusted forensic techniques, as well as allow the investigation team to isolate the database server from the network to prevent users from tampering with it and to capture volatile and non-volatile data. Finally, [44] introduced a Database Identification process useful for defining, identifying, preparing, detecting, and investigating database incidents. This is the initial process of an investigation to find a problem in the database.…”
Section: Phase 3: Combined Similar Processesmentioning
confidence: 99%
“…2018 CDBFIP: Common database forensic investigation processes for internet of things[43].22. 2018 Five Stages of Database Forensic Analysis: A SystematicLiterature Review[44]…”
mentioning
confidence: 99%
“…The methods approach raw data directly, so it can improve the drawback of the log-based method. Previous studies mainly analyzed small-sized databases such as SQLite [15]- [17] and EDB [18], [19], used in endpoint devices (desktop computers, smartphones, and tablets). On the other hand, there is no research describing an engine-based recovery method for large databases, mainly used in enterprises or large organizations, such as MSSQL and Oracle.…”
Section: Introductionmentioning
confidence: 99%