Implementing chain of custody requirements in database audit records for forensic purposes
Abstract:
During forensic database investigations, audit records become a crucial evidential element; particularly, when certain events can be attributed to insider activity. However, traditional reactive forensic methods may not be suitable, urging the adoption of proactive approaches that can be used to ensure accountability through audit records whilst satisfying Chain of Custody (CoC) requirements for forensic purposes. In this paper, role segregation, evidence provenance, event timeliness and causality are considered as CoC requirements in order to implement a forensically ready architecture for the proactive generation, collection and preservation of database audit records that can be used as digital evidence for the investigation of insider activity. Our proposal implements triggers and stored procedures as forensic routines in order to build a vector-clock-based timeline for explaining causality in transactional events recorded in audit tables. We expect to encourage further work in the field of proactive digital forensics and forensic readiness; in particular, for justifying admissibility of audit records under CoC restrictions.
Año de publicación:
2017
Keywords:
- Proactive
- Timeline
- Admissibility
- Role segregation
- Chain of custody
- Architecture
- Database forensics
- Audit
- Vector clock
- Trigger
- Provenance
- Stored procedure
- causality
Fuente:
Tipo de documento:
Conference Object
Estado:
Acceso restringido
Áreas de conocimiento:
- Base de datos
- Base de datos
Áreas temáticas:
- Funcionamiento de bibliotecas y archivos