CIPM: Common Identification Process Model for Database Forensics Field

08/12/2021
by   Ibrahim Alfadli, et al.
0

Database Forensics (DBF) domain is a branch of digital forensics, concerned with the identification, collection, reconstruction, analysis, and documentation of database crimes. Different researchers have introduced several identification models to handle database crimes. Majority of proposed models are not specific and are redundant, which makes these models a problem because of the multidimensional nature and high diversity of database systems. Accordingly, using the metamodeling approach, the current study is aimed at proposing a unified identification model applicable to the database forensic field. The model integrates and harmonizes all exiting identification processes into a single abstract model, called Common Identification Process Model (CIPM). The model comprises six phases: 1) notifying an incident, 2) responding to the incident, 3) identification of the incident source, 4) verification of the incident, 5) isolation of the database server and 6) provision of an investigation environment. CIMP was found capable of helping the practitioners and newcomers to the forensics domain to control database crimes.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/29/2017

Speaker Identification in the Shouted Environment Using Suprasegmental Hidden Markov Models

In this paper, Suprasegmental Hidden Markov Models (SPHMMs) have been us...
research
06/15/2021

Demographic Fairness in Face Identification: The Watchlist Imbalance Effect

Recently, different researchers have found that the gallery composition ...
research
10/31/2012

Mugshot Identification from Manipulated Facial Images

Editing on digital images is ubiquitous. Identification of deliberately ...
research
03/31/2018

Emirati-Accented Speaker Identification in each of Neutral and Shouted Talking Environments

This work is devoted to capturing Emirati-accented speech database (Arab...
research
01/21/2013

A formalization of re-identification in terms of compatible probabilities

Re-identification algorithms are used in data privacy to measure disclos...
research
06/15/2017

Arabian Horse Identification Benchmark Dataset

The lack of a standard muzzle print database is a challenge for conducti...
research
04/09/2019

Modeling Corruption in Eventually-Consistent Graph Databases

We present a model and analysis of an eventually consistent graph databa...

Please sign up or login with your details

Forgot password? Click here to reset