Skip to main content

Database Forensics Field and Children Crimes

  • Chapter
  • First Online:
Kids Cybersecurity Using Computational Intelligence Techniques

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1080))

Abstract

Cybersecurity for teenagers has gotten much consideration and has growth quickly due to the increased accessibility of the Internet to teenagers/children and their consequent disclosure to several online threats. Database forensics is one of the cybersecurity components used to capture and analyze children's crimes. It's a significant field to discover who the criminal is, how the crime occurred, and when it occurred. It has several tools and techniques which aid the investigators in capturing and analyzing data from victim devices. For this purpose, this book chapter highlights the database forensics role in revealing childrens' crimes. Also, it highlights the challenges and issues of database forensics. The results of this book chapter showed that database forensics lacks a well-defined and integrated approach that enables working, distributing, and reprocessing the database forensic domain knowledge.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. C. Zhu, S. Huang, R. Evans, W. Zhang, Cyberbullying among adolescents and children: a comprehensive review of the global situation, risk factors, and preventive measures. Front. Public Heal. 9, 634909 (2021)

    Article  Google Scholar 

  2. C. Evangelio, P. Rodriguez-Gonzalez, J. Fernandez-Rio, S. Gonzalez-Villora, Cyberbullying in elementary and middle school students: a systematic review. Comput. Educ. 176, 104356 (2022)

    Article  Google Scholar 

  3. L.J. Thun, P.L. Teh, C.-B. Cheng, CyberAid: are your children safe from cyberbullying? J. King Saud Univ. Inf. Sci. 34(7), 4099–4108 (2022)

    Google Scholar 

  4. D. Strohmeier, P. Gradinger, Cyberbullying and cyber victimization as online risks for children and adolescents. Eur. Psychol. 27(2), 141 (2022)

    Article  Google Scholar 

  5. M. Radetić-Paić, V. Boljunčić, The causes of ICT use which increase time spent on the Internet by secondary school students and affect exposure to bullying from other students. Econ. Res. Istraživanja 35(1), 2859–2867 (2022)

    Article  Google Scholar 

  6. A.A.L. Nuaimi, Effectiveness of cyberbullying prevention strategies in the UAE, in ICT Analysis and Applications (Springer, 2021), pp. 731–739

    Google Scholar 

  7. R.M. Alhejaili, W.M. Yafooz, A. A. Alsaeedi, Hate speech and abusive language detection In twitter and challenges, in 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), May 2022 (IEEE, 2022), pp. 86–94

    Google Scholar 

  8. A. Al-Dhaqm et al., Categorization and organization of database forensic investigation processes. IEEE Access 8, 112846–112858 (2020)

    Article  Google Scholar 

  9. A. Al-Dhaqm, S. Razak, S.H. Othman, A. Ngadi, M.N. Ahmed, A.A. Mohammed, Development and validation of a database forensic metamodel (DBFM). PLoS One 12(2) (2017). https://doi.org/10.1371/journal.pone.0170793

  10. A. Al-Dhaqm, S. Razak, R.A. Ikuesan, V.R Kebande, S. Hajar Othman, Face validation of database forensic investigation metamodel. Infrastructures 6(2), 13 (2021)

    Google Scholar 

  11. Y. Bassil, A comparative study on the performance of the Top DBMS systems (2012), arXiv:1205.2889

  12. S.A. Razak, N.H.M. Nazari, A. Al-Dhaqm, Data anonymization using pseudonym system to preserve data privacy. IEEE Access 8 (2020). https://doi.org/10.1109/ACCESS.2020.2977117

  13. P.M. Wright, Oracle database forensics using LogMiner, in June 2004 Conference. SANS Institute (2005), pp. 1–39

    Google Scholar 

  14. R. Rankins, P. Bertucci, C. Gallelli, A.T. Silverstein, Microsoft SQL Server 2008 R2 Unleashed (Pearson Education, 2010)

    Google Scholar 

  15. K. Fowler, SQL Server Forenisc Analysis (Pearson Education, 2008)

    Google Scholar 

  16. O.M. Adedayo, M.S. Olivier, Ideal log setting for database forensics reconstruction. Digit. Investig. 12, 27–40 (2015)

    Article  Google Scholar 

  17. S. Bourbonnais et al., Towards an information infrastructure for the grid. IBM Syst. J. 43(4), 665–688 (2004)

    Article  Google Scholar 

  18. K.W. Brooks, T.H. Fox, L.W. Davis, A critical look at currently available radiation oncology information management systems. Semin. Radiat. Oncol. 7(1), 49–57 (1997)

    Article  Google Scholar 

  19. R. Withers, R. Casson, A. Shrimplin, Creating Web-based listings of electronic journals without creating extra work. Libr. Collect. Acquis. Tech. Serv. 26(2), 107–112 (2002)

    Google Scholar 

  20. H.Q. Beyers, Database forensics: Investigating compromised database management systems. University of Pretoria (2013)

    Google Scholar 

  21. A. Al-Dhaqm, S. A. Razak, S.H. Othman, A. Nagdi, A. Ali, A generic database forensic investigation process model. J. Teknol. 78(6–11) (2016). https://doi.org/10.11113/jt.v78.9190

  22. A. Al-Dhaqm, S. Razak, K. Siddique, R.A. Ikuesan, V.R. Kebande, Towards the development of an integrated incident response model for database forensic investigation field. IEEE Access (2020), p. 1. https://doi.org/10.1109/ACCESS.2020.3008696

  23. A. Al-Dhaqm et al., CDBFIP: Common database forensic investigation processes for Internet of Things. IEEE Access 5, 24401–24416 (2017)

    Article  Google Scholar 

  24. O.M. Fasan, M.S. Olivier, On dimensions of reconstruction in database forensics, in WDFIA (2012), pp. 97–106

    Google Scholar 

  25. D. Wong, K. Edwards, System and method for investigating a data operation performed on a database, December 2005. Google Patents (2005)

    Google Scholar 

  26. K. Fowler, Forensic analysis of a SQL Server 2005 database server. InfoSec Reading Room, SANS Institute, Bethesda, Maryland (2007)

    Google Scholar 

  27. A. Basu, Forensic tamper detection in SQL server (2006)

    Google Scholar 

  28. D. Litchfield, Oracle forensics part 4: live response. NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton (2007)

    Google Scholar 

  29. D. Litchfield, Oracle forensics part 5: finding evidence of data theft in the absence of auditing. NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton (2007)

    Google Scholar 

  30. G.T. Lee, S. Lee, E. Tsomko, S. Lee, Discovering methodology and scenario to detect covert database system, in Future Generation Communication and Networking (FGCN 2007), vol. 2 (2007), pp. 130–135

    Google Scholar 

  31. D. Litchfield, Oracle forensics part 2: locating dropped objects. NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton (2007)

    Google Scholar 

  32. D. Lee, J. Choi, S. Lee, Database forensic investigation based on table relationship analysis techniques, in 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 (2009), p. 5404235

    Google Scholar 

  33. J. Choi, K. Choi, S. Lee, Evidence investigation methodologies for detecting financial fraud based on forensic accounting, in 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 (2009), p. 5404202

    Google Scholar 

  34. M.S. Olivier, On metadata context in database forensics. Digit. Investig. 5(3–4), 115–123 (2009)

    Article  Google Scholar 

  35. J. Azemović, D. Mušić, Efficient model for detection data and data scheme tempering with purpose of valid forensic analysis (2009)

    Google Scholar 

  36. J. Azemovic, D. Mušic, Methods for efficient digital evidences collecting of business processes and users activity in eLearning environments, in 2010 International Conference on e-Education, e-Business, e-Management and e-Learning (2010), pp. 126–130

    Google Scholar 

  37. N. Son, K. Lee, S. Jeon, H. Chung, S. Lee, C. Lee, The method of database server detection and investigation in the enterprise environment, in FTRA International Conference on Secure and Trust Computing, Data Management, and Application (2011), pp. 164–171

    Google Scholar 

  38. H. Beyers, M. Olivier, G. Hancke, Assembling metadata for database forensics, in IFIP International Conference on Digital Forensics (2011), pp. 89–99

    Google Scholar 

  39. S. Tripathi, B.B. Meshram, Digital evidence for database tamper detection (2012)

    Google Scholar 

  40. H.K. Khanuja, D.S. Adane, A framework for database forensic analysis. Comput. Sci. Eng. 2(3), 27 (2012)

    Google Scholar 

  41. R. Susaimanickam, A workflow to support forensic database analysis. Murdoch University (2012)

    Google Scholar 

  42. O.M. Fasan, M. Olivier, Reconstruction in database forensics, in IFIP International Conference on Digital Forensics (2012), pp. 273–287

    Google Scholar 

  43. H. Beyers, M.S. Olivier, G.P. Hancke, Arguments and methods for database data model forensics, in WDFIA (2012), pp. 139–149

    Google Scholar 

  44. H.K. Khanuja, D. Adane, Forensic analysis of databases by combining multiple evidences. Int. J. Comput. Technol. 7(3), 654–663 (2013)

    Article  Google Scholar 

  45. H.Q. Beyers, Database forensics: investigating compromised database management systems. University of Pretoria (2014)

    Google Scholar 

  46. H. Khanuja, S.S. Suratkar, Role of metadata in forensic analysis of database attacks, in 2014 IEEE International Advance Computing Conference (IACC) (2014), pp. 457–462

    Google Scholar 

  47. P. Frühwirt, P. Kieseberg, K. Krombholz, E. Weippl, Towards a forensic-aware database solution: using a secured database replication protocol and transaction management for digital investigations. Digit. Investig. 11(4), 336–348 (2014)

    Article  Google Scholar 

  48. A.C. Lawrence, Forensic investigation of MySQL database management system (2013)

    Google Scholar 

  49. J. Wagner, A. Rasin, J. Grier, Database forensic analysis through internal structure carving. Digit. Investig. 14, S106–S115 (2015)

    Article  Google Scholar 

  50. J.O. Ogutu, A methodology to test the richness of forensic evidence of database storage engine: analysis of MySQL update operation in InnoDB and MyISAM storage engines. University of Nairobi (2016)

    Google Scholar 

  51. J. Wagner, A. Rasin, T. Malik, K. Heart, H. Jehle, J. Grier, Database forensic analysis with DBCarver (2017)

    Google Scholar 

  52. A. Al-Dhaqm, S. Razak, S.H. Othman, A. Ngadi, M.N. Ahmed, A. Ali Mohammed, Development and validation of a Database Forensic Metamodel (DBFM). PLoS One 12(2), e0170793 (2017)

    Google Scholar 

  53. A. Al-Dhaqm, S. Razak, R.A. Ikuesan, V.R. Kebande, S.H. Othman, Face validation of database forensic investigation metamodel. Infrastructures 6(2) (2021). https://doi.org/10.3390/infrastructures6020013

  54. A.A. Alhussan, A. Al-Dhaqm, W. Yafooz, A.-H. M. Emara, S. Bin Abd Razak, D.S. Khafaga, A unified forensic model applicable to the database forensics field. Electronics 11(9), 1347 (2022)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arafat Al-Dhaqm .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-Dhaqm, A., Yafooz, W.M.S., Othman, S.H., Ali, A. (2023). Database Forensics Field and Children Crimes. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_6

Download citation

Publish with us

Policies and ethics