Forense Digital e Bancos de Dados: um Survey
Resumo
Este artigo resume uma revisão sistemática da literatura com classificação simples para publicações na interseção entre Forense Digital e Bancos de Dados. Esta pesquisa abre as portas para comunicação entre Bancos de Dados e uma área com vários desafios interessantes e concretos.
Palavras-chave:
Forense Digital, Bancos de Dados, Survey, Revisão Sistemática da Literatura
Referências
Al-Dhaqm, A. et al. (2020a). Categorization and organization of database forensic investigation processes. IEEE Access, 8:112846–112858.
Al-Dhaqm, A. et al. (2020b). Database forensic investigation process models: A review. IEEE Access, 8:48477–48490.
Atwal, T. S. et al. (2019). Shining a light on spotlight: Leveraging apple’s desktop search utility to recover deleted file metadata on macos. Digital Investigation, 28:S105–S115.
Awasthi, A. et al. (2018). Welcome pwn: Almond smart home hub forensics. Digital Investigation, 26:S38–S46.
Chen, P. S. (2008). Discovering Investigation Clues through Mining Criminal Databases, pages 173–198. Springer Berlin Heidelberg, Berlin, Heidelberg.
Choi, H., Lee, S., and Jeong, D. (2021). Forensic recovery of SQL server database: Practical approach. IEEE Access, 9:14564–14575.
Freiling, F. and H¨osch, L. (2018). Controlled experiments in digital evidence tampering. Digital Investigation, 24:S83–S92.
Henseler, H. and van Loenhout, S. (2018). Educating judges, prosecutors and lawyers in the use of digital forensic experts. Digital Investigation, 24:S76–S82.
Hommes, S. et al. (2013). Automated source code extension for debugging of openflow based networks. In CNSM, pages 105–108.
Khanji, S. I. R., Khattak, A. M., and Hacid, H. (2015). Database auditing and forensics: Exploration and evaluation. In AICCSA, pages 1–6.
Khobragade, P. K. and Malik, L. G. (2014). Data generation and analysis for digital forensic application using data mining. In CSNT, pages 458–462.
Kitchenham, B. and Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01, Keele University and Durham University Joint Report.
Li, Q., Hu, X., and Wu, H. (2014). Database management strategy and recovery methods of android. In ICSESS, pages 727–730.
Liu, X., Fu, X., and Sun, G. (2016). Recovery of deleted record for SQLite3 database. In IHMSC, pages 183–187.
Ming, H. and LiZhong, S. (2009). A new system design of network invasion forensics. In ICCEE, pages 596–599.
Qi, M. (2014). Digital forensics and NoSQL databases. In FSKD, pages 734–739.
Qi, M. et al. (2014). Big data management in digital forensics. In CSE, pages 238–243.
Salunkhe, P., Bharne, S., and Padiya, P. (2016). Data analysis of file forensic investigation. In SCOPES, pages 372–375.
Satrya, G. B., Daely, P. T., and Nugroho, M. A. (2016). Digital forensic analysis of telegram messenger on android devices. In ICTS, pages 1–7.
Servida, F. and Casey, E. (2019). Iot forensic challenges and opportunities for digital traces. Digital Investigation, 28:S22–S29.
Sikos, L. F. (2020). Packet analysis for network forensics: A comprehensive survey. FSI: Digital Investigation, 32:200892.
van Zandwijk, J. P. and Boztas, A. (2019). The iphone health app from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? Digital Investigation, 28:S126–S133.
Xie, X. et al. (2019). SQL injection detection for web applications based on elasticpooling cnn. IEEE Access, 7:151475–151481.
Al-Dhaqm, A. et al. (2020b). Database forensic investigation process models: A review. IEEE Access, 8:48477–48490.
Atwal, T. S. et al. (2019). Shining a light on spotlight: Leveraging apple’s desktop search utility to recover deleted file metadata on macos. Digital Investigation, 28:S105–S115.
Awasthi, A. et al. (2018). Welcome pwn: Almond smart home hub forensics. Digital Investigation, 26:S38–S46.
Chen, P. S. (2008). Discovering Investigation Clues through Mining Criminal Databases, pages 173–198. Springer Berlin Heidelberg, Berlin, Heidelberg.
Choi, H., Lee, S., and Jeong, D. (2021). Forensic recovery of SQL server database: Practical approach. IEEE Access, 9:14564–14575.
Freiling, F. and H¨osch, L. (2018). Controlled experiments in digital evidence tampering. Digital Investigation, 24:S83–S92.
Henseler, H. and van Loenhout, S. (2018). Educating judges, prosecutors and lawyers in the use of digital forensic experts. Digital Investigation, 24:S76–S82.
Hommes, S. et al. (2013). Automated source code extension for debugging of openflow based networks. In CNSM, pages 105–108.
Khanji, S. I. R., Khattak, A. M., and Hacid, H. (2015). Database auditing and forensics: Exploration and evaluation. In AICCSA, pages 1–6.
Khobragade, P. K. and Malik, L. G. (2014). Data generation and analysis for digital forensic application using data mining. In CSNT, pages 458–462.
Kitchenham, B. and Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Technical Report EBSE-2007-01, Keele University and Durham University Joint Report.
Li, Q., Hu, X., and Wu, H. (2014). Database management strategy and recovery methods of android. In ICSESS, pages 727–730.
Liu, X., Fu, X., and Sun, G. (2016). Recovery of deleted record for SQLite3 database. In IHMSC, pages 183–187.
Ming, H. and LiZhong, S. (2009). A new system design of network invasion forensics. In ICCEE, pages 596–599.
Qi, M. (2014). Digital forensics and NoSQL databases. In FSKD, pages 734–739.
Qi, M. et al. (2014). Big data management in digital forensics. In CSE, pages 238–243.
Salunkhe, P., Bharne, S., and Padiya, P. (2016). Data analysis of file forensic investigation. In SCOPES, pages 372–375.
Satrya, G. B., Daely, P. T., and Nugroho, M. A. (2016). Digital forensic analysis of telegram messenger on android devices. In ICTS, pages 1–7.
Servida, F. and Casey, E. (2019). Iot forensic challenges and opportunities for digital traces. Digital Investigation, 28:S22–S29.
Sikos, L. F. (2020). Packet analysis for network forensics: A comprehensive survey. FSI: Digital Investigation, 32:200892.
van Zandwijk, J. P. and Boztas, A. (2019). The iphone health app from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? Digital Investigation, 28:S126–S133.
Xie, X. et al. (2019). SQL injection detection for web applications based on elasticpooling cnn. IEEE Access, 7:151475–151481.
Publicado
04/10/2021
Como Citar
SEUFITELLI, Danillo B.; MOURA, Ana Flávia C.; FERNANDES, Ayane C. A.; SIQUEIRA, Kayque M.; BRANDÃO, Michele A.; MORO, Mirella M..
Forense Digital e Bancos de Dados: um Survey. In: SIMPÓSIO BRASILEIRO DE BANCO DE DADOS (SBBD), 36. , 2021, Rio de Janeiro.
Anais [...].
Porto Alegre: Sociedade Brasileira de Computação,
2021
.
p. 307-312.
ISSN 2763-8979.
DOI: https://doi.org/10.5753/sbbd.2021.17890.