Forensic Investigation of a Database for Web Application
DOI:
https://doi.org/10.32628/IJSRSET218326Keywords:
Database Legal, Database Scientific Examination, Advanced ForensicsAbstract
Database Scientific Investigation(DBFI) includes the distinguishing proof, collection, conservation, remaking, examination, and detailing of database episodes. in any case, it may be a heterogeneous, complex, and vague field due to the assortment and multidimensional nature of database frameworks. Database measurable examination (DBFI)is an imperative region of inquiring about inside advanced forensics. Its significance is developing as advanced information gets to be more broad and commonplace. The challenges related to DBFI are various, and one of the challenges is the need for a harmonized DBFI handle for the examination to take after. This harmonized DBFI preparation has been created based on three key categories (i.e. arranging, arrangement, and pre- response, procurement and conservation and investigation, and reconstruction).
References
- Al-Durham, A., Abd Razak, S., Dampier, D. A., Choo, K. K. R., Siddique, K., Ikuesan, R. A., ... & Kebande, V. R. (2020). Categorization and organization of database forensic investigation processes. IEEE Access, 8, 112846-112858.
- Al-Durham, A., Abd Razak, S., Dampier, D. A., Choo, K. K. R., Siddique, K., Ikuesan, R. A., ... & Kebande, V. R. (2020). Categorization and organization of database forensic investigation processes. IEEE Access, 8, 112846-112858.
- Sunde, N., & Dror, I. E. (2019). Cognitive and human factors in digital forensics: Problems, challenges, and the way forward. Digital Investigation, 29, 101-108.
- A. Singh, A. R. Ikuesan, and H. S. Venter, "Digital forensic readiness framework for ransomware investigation," in Proc. Int. Conf. Digit. Forensics Cyber Crime. Midrand, South Africa: Springer, 2018, pp. 91_105.
- S. R. Selamat, R. Yusof, and S. Sahib, "Mapping process of digital forensic investigation framework," Int. J. Comput. Sci. Netw. Secure., vol. 8, no. 10, pp. 163_169, 2008
- Y. Yusoff, R. Ismail, and Z. Hassan, "Common phases of computer forensics investigation models," Int. J. Comput. Sci. Inf. Technol., vol. 3, no. 3, pp. 17_31, Jun. 2011.
- Lazzez, A., & Slimani, T. (2015). Forensics investigation of web application security attacks. Int. J. Comput. Netw. Inf. Secure, 7(3), 10-17.
- Al-Dhaqm, A., Abd Razak, S., Othman, S. H., Ali, A., Ghaleb, F. A., Rosman, A. S., & Marni, N. (2020). Database Forensic Investigation Process Models: A Review. IEEE Access, 8, 48477-48490.
- David, A., Morris, S., & Appleby-Thomas, G. (2020). A Two-Stage Model for Social Network Investigations in Digital Forensics. Journal of Digital Forensics, Security and Law, 15(2), 1.
- S. Kelly and R. Pohjonen, "Worst practices for domain-speci_c modeling,"IEEE Softw., vol. 26, no. 4, pp. 22_29, Jul. 2009.
- M. F. Caro, D. P. Josyula, M. T. Cox, and J. A. Jimenez, "Design and validation of a metamodel for metacognition support in arti_cial intelligent systems," Biologically Inspired Cognit. Archit., vol. 9, pp. 82_104,Jul. 2014.
- A. C. Bogen and D. A. Dampier,"Preparing for large-scale investigations with case domain modeling," in Proc. DFRWS, Aug. 2005, pp. 1_10.
Downloads
Published
Issue
Section
License
Copyright (c) IJSRSET

This work is licensed under a Creative Commons Attribution 4.0 International License.