Abstract
Cybersecurity for teenagers has gotten much consideration and has growth quickly due to the increased accessibility of the Internet to teenagers/children and their consequent disclosure to several online threats. Database forensics is one of the cybersecurity components used to capture and analyze children's crimes. It's a significant field to discover who the criminal is, how the crime occurred, and when it occurred. It has several tools and techniques which aid the investigators in capturing and analyzing data from victim devices. For this purpose, this book chapter highlights the database forensics role in revealing childrens' crimes. Also, it highlights the challenges and issues of database forensics. The results of this book chapter showed that database forensics lacks a well-defined and integrated approach that enables working, distributing, and reprocessing the database forensic domain knowledge.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
C. Zhu, S. Huang, R. Evans, W. Zhang, Cyberbullying among adolescents and children: a comprehensive review of the global situation, risk factors, and preventive measures. Front. Public Heal. 9, 634909 (2021)
C. Evangelio, P. Rodriguez-Gonzalez, J. Fernandez-Rio, S. Gonzalez-Villora, Cyberbullying in elementary and middle school students: a systematic review. Comput. Educ. 176, 104356 (2022)
L.J. Thun, P.L. Teh, C.-B. Cheng, CyberAid: are your children safe from cyberbullying? J. King Saud Univ. Inf. Sci. 34(7), 4099–4108 (2022)
D. Strohmeier, P. Gradinger, Cyberbullying and cyber victimization as online risks for children and adolescents. Eur. Psychol. 27(2), 141 (2022)
M. Radetić-Paić, V. Boljunčić, The causes of ICT use which increase time spent on the Internet by secondary school students and affect exposure to bullying from other students. Econ. Res. Istraživanja 35(1), 2859–2867 (2022)
A.A.L. Nuaimi, Effectiveness of cyberbullying prevention strategies in the UAE, in ICT Analysis and Applications (Springer, 2021), pp. 731–739
R.M. Alhejaili, W.M. Yafooz, A. A. Alsaeedi, Hate speech and abusive language detection In twitter and challenges, in 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES), May 2022 (IEEE, 2022), pp. 86–94
A. Al-Dhaqm et al., Categorization and organization of database forensic investigation processes. IEEE Access 8, 112846–112858 (2020)
A. Al-Dhaqm, S. Razak, S.H. Othman, A. Ngadi, M.N. Ahmed, A.A. Mohammed, Development and validation of a database forensic metamodel (DBFM). PLoS One 12(2) (2017). https://doi.org/10.1371/journal.pone.0170793
A. Al-Dhaqm, S. Razak, R.A. Ikuesan, V.R Kebande, S. Hajar Othman, Face validation of database forensic investigation metamodel. Infrastructures 6(2), 13 (2021)
Y. Bassil, A comparative study on the performance of the Top DBMS systems (2012), arXiv:1205.2889
S.A. Razak, N.H.M. Nazari, A. Al-Dhaqm, Data anonymization using pseudonym system to preserve data privacy. IEEE Access 8 (2020). https://doi.org/10.1109/ACCESS.2020.2977117
P.M. Wright, Oracle database forensics using LogMiner, in June 2004 Conference. SANS Institute (2005), pp. 1–39
R. Rankins, P. Bertucci, C. Gallelli, A.T. Silverstein, Microsoft SQL Server 2008 R2 Unleashed (Pearson Education, 2010)
K. Fowler, SQL Server Forenisc Analysis (Pearson Education, 2008)
O.M. Adedayo, M.S. Olivier, Ideal log setting for database forensics reconstruction. Digit. Investig. 12, 27–40 (2015)
S. Bourbonnais et al., Towards an information infrastructure for the grid. IBM Syst. J. 43(4), 665–688 (2004)
K.W. Brooks, T.H. Fox, L.W. Davis, A critical look at currently available radiation oncology information management systems. Semin. Radiat. Oncol. 7(1), 49–57 (1997)
R. Withers, R. Casson, A. Shrimplin, Creating Web-based listings of electronic journals without creating extra work. Libr. Collect. Acquis. Tech. Serv. 26(2), 107–112 (2002)
H.Q. Beyers, Database forensics: Investigating compromised database management systems. University of Pretoria (2013)
A. Al-Dhaqm, S. A. Razak, S.H. Othman, A. Nagdi, A. Ali, A generic database forensic investigation process model. J. Teknol. 78(6–11) (2016). https://doi.org/10.11113/jt.v78.9190
A. Al-Dhaqm, S. Razak, K. Siddique, R.A. Ikuesan, V.R. Kebande, Towards the development of an integrated incident response model for database forensic investigation field. IEEE Access (2020), p. 1. https://doi.org/10.1109/ACCESS.2020.3008696
A. Al-Dhaqm et al., CDBFIP: Common database forensic investigation processes for Internet of Things. IEEE Access 5, 24401–24416 (2017)
O.M. Fasan, M.S. Olivier, On dimensions of reconstruction in database forensics, in WDFIA (2012), pp. 97–106
D. Wong, K. Edwards, System and method for investigating a data operation performed on a database, December 2005. Google Patents (2005)
K. Fowler, Forensic analysis of a SQL Server 2005 database server. InfoSec Reading Room, SANS Institute, Bethesda, Maryland (2007)
A. Basu, Forensic tamper detection in SQL server (2006)
D. Litchfield, Oracle forensics part 4: live response. NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton (2007)
D. Litchfield, Oracle forensics part 5: finding evidence of data theft in the absence of auditing. NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton (2007)
G.T. Lee, S. Lee, E. Tsomko, S. Lee, Discovering methodology and scenario to detect covert database system, in Future Generation Communication and Networking (FGCN 2007), vol. 2 (2007), pp. 130–135
D. Litchfield, Oracle forensics part 2: locating dropped objects. NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd., Sutton (2007)
D. Lee, J. Choi, S. Lee, Database forensic investigation based on table relationship analysis techniques, in 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 (2009), p. 5404235
J. Choi, K. Choi, S. Lee, Evidence investigation methodologies for detecting financial fraud based on forensic accounting, in 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 (2009), p. 5404202
M.S. Olivier, On metadata context in database forensics. Digit. Investig. 5(3–4), 115–123 (2009)
J. Azemović, D. Mušić, Efficient model for detection data and data scheme tempering with purpose of valid forensic analysis (2009)
J. Azemovic, D. Mušic, Methods for efficient digital evidences collecting of business processes and users activity in eLearning environments, in 2010 International Conference on e-Education, e-Business, e-Management and e-Learning (2010), pp. 126–130
N. Son, K. Lee, S. Jeon, H. Chung, S. Lee, C. Lee, The method of database server detection and investigation in the enterprise environment, in FTRA International Conference on Secure and Trust Computing, Data Management, and Application (2011), pp. 164–171
H. Beyers, M. Olivier, G. Hancke, Assembling metadata for database forensics, in IFIP International Conference on Digital Forensics (2011), pp. 89–99
S. Tripathi, B.B. Meshram, Digital evidence for database tamper detection (2012)
H.K. Khanuja, D.S. Adane, A framework for database forensic analysis. Comput. Sci. Eng. 2(3), 27 (2012)
R. Susaimanickam, A workflow to support forensic database analysis. Murdoch University (2012)
O.M. Fasan, M. Olivier, Reconstruction in database forensics, in IFIP International Conference on Digital Forensics (2012), pp. 273–287
H. Beyers, M.S. Olivier, G.P. Hancke, Arguments and methods for database data model forensics, in WDFIA (2012), pp. 139–149
H.K. Khanuja, D. Adane, Forensic analysis of databases by combining multiple evidences. Int. J. Comput. Technol. 7(3), 654–663 (2013)
H.Q. Beyers, Database forensics: investigating compromised database management systems. University of Pretoria (2014)
H. Khanuja, S.S. Suratkar, Role of metadata in forensic analysis of database attacks, in 2014 IEEE International Advance Computing Conference (IACC) (2014), pp. 457–462
P. Frühwirt, P. Kieseberg, K. Krombholz, E. Weippl, Towards a forensic-aware database solution: using a secured database replication protocol and transaction management for digital investigations. Digit. Investig. 11(4), 336–348 (2014)
A.C. Lawrence, Forensic investigation of MySQL database management system (2013)
J. Wagner, A. Rasin, J. Grier, Database forensic analysis through internal structure carving. Digit. Investig. 14, S106–S115 (2015)
J.O. Ogutu, A methodology to test the richness of forensic evidence of database storage engine: analysis of MySQL update operation in InnoDB and MyISAM storage engines. University of Nairobi (2016)
J. Wagner, A. Rasin, T. Malik, K. Heart, H. Jehle, J. Grier, Database forensic analysis with DBCarver (2017)
A. Al-Dhaqm, S. Razak, S.H. Othman, A. Ngadi, M.N. Ahmed, A. Ali Mohammed, Development and validation of a Database Forensic Metamodel (DBFM). PLoS One 12(2), e0170793 (2017)
A. Al-Dhaqm, S. Razak, R.A. Ikuesan, V.R. Kebande, S.H. Othman, Face validation of database forensic investigation metamodel. Infrastructures 6(2) (2021). https://doi.org/10.3390/infrastructures6020013
A.A. Alhussan, A. Al-Dhaqm, W. Yafooz, A.-H. M. Emara, S. Bin Abd Razak, D.S. Khafaga, A unified forensic model applicable to the database forensics field. Electronics 11(9), 1347 (2022)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Al-Dhaqm, A., Yafooz, W.M.S., Othman, S.H., Ali, A. (2023). Database Forensics Field and Children Crimes. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-031-21199-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21198-0
Online ISBN: 978-3-031-21199-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)