Database forensic investigation based on table relationship analysis techniques

Dongchan Lee, Jaemin Choi, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

Most company and organizations manage personnel, account, logistics etc through the database system. The business data stored these database is very important to investigate company dishonest act in the view of the digital forensics. However, it is difficult to extract meaningful data without blueprints because the table inside the database has exceedingly complicated relation and the role of the table and field in the table was so ambiguous. If we don't obtain the database's database or even if we get, but don't understand relationship in the table and meaning of each field, we cannot obtain the significant evidences. Therefore, the investigator should confirm the contents of the database blueprints and check the relationship between the table and hidden table which unsigned blueprints. In this paper, we improve the DBRE (database reverse engineering) process and analyze the table relationship of database and data extraction method in the view of the digital forensics. Moreover we proposed the efficient tool which more easily acquires digital evidences from databases using table relationship and data extraction.

Original languageEnglish
Title of host publicationProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
DOIs
Publication statusPublished - 2009 Dec 1
Event2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 - Jeju Island, Korea, Republic of
Duration: 2009 Dec 102009 Dec 12

Other

Other2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
CountryKorea, Republic of
CityJeju Island
Period09/12/1009/12/12

Fingerprint

Blueprints
Industry
Reverse engineering
Logistics
Personnel
Digital forensics

Keywords

  • DB forensic
  • ERP
  • Table relationship

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications

Cite this

Lee, D., Choi, J., & Lee, S. (2009). Database forensic investigation based on table relationship analysis techniques. In Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 [5404235] https://doi.org/10.1109/CSA.2009.5404235

Database forensic investigation based on table relationship analysis techniques. / Lee, Dongchan; Choi, Jaemin; Lee, Sangjin.

Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 2009. 5404235.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, D, Choi, J & Lee, S 2009, Database forensic investigation based on table relationship analysis techniques. in Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009., 5404235, 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009, Jeju Island, Korea, Republic of, 09/12/10. https://doi.org/10.1109/CSA.2009.5404235
Lee D, Choi J, Lee S. Database forensic investigation based on table relationship analysis techniques. In Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 2009. 5404235 https://doi.org/10.1109/CSA.2009.5404235
Lee, Dongchan ; Choi, Jaemin ; Lee, Sangjin. / Database forensic investigation based on table relationship analysis techniques. Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009. 2009.
@inproceedings{2ee70a2fe2a147b791c0876f31f6119b,
title = "Database forensic investigation based on table relationship analysis techniques",
abstract = "Most company and organizations manage personnel, account, logistics etc through the database system. The business data stored these database is very important to investigate company dishonest act in the view of the digital forensics. However, it is difficult to extract meaningful data without blueprints because the table inside the database has exceedingly complicated relation and the role of the table and field in the table was so ambiguous. If we don't obtain the database's database or even if we get, but don't understand relationship in the table and meaning of each field, we cannot obtain the significant evidences. Therefore, the investigator should confirm the contents of the database blueprints and check the relationship between the table and hidden table which unsigned blueprints. In this paper, we improve the DBRE (database reverse engineering) process and analyze the table relationship of database and data extraction method in the view of the digital forensics. Moreover we proposed the efficient tool which more easily acquires digital evidences from databases using table relationship and data extraction.",
keywords = "DB forensic, ERP, Table relationship",
author = "Dongchan Lee and Jaemin Choi and Sangjin Lee",
year = "2009",
month = "12",
day = "1",
doi = "10.1109/CSA.2009.5404235",
language = "English",
isbn = "9781424449460",
booktitle = "Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009",

}

TY - GEN

T1 - Database forensic investigation based on table relationship analysis techniques

AU - Lee, Dongchan

AU - Choi, Jaemin

AU - Lee, Sangjin

PY - 2009/12/1

Y1 - 2009/12/1

N2 - Most company and organizations manage personnel, account, logistics etc through the database system. The business data stored these database is very important to investigate company dishonest act in the view of the digital forensics. However, it is difficult to extract meaningful data without blueprints because the table inside the database has exceedingly complicated relation and the role of the table and field in the table was so ambiguous. If we don't obtain the database's database or even if we get, but don't understand relationship in the table and meaning of each field, we cannot obtain the significant evidences. Therefore, the investigator should confirm the contents of the database blueprints and check the relationship between the table and hidden table which unsigned blueprints. In this paper, we improve the DBRE (database reverse engineering) process and analyze the table relationship of database and data extraction method in the view of the digital forensics. Moreover we proposed the efficient tool which more easily acquires digital evidences from databases using table relationship and data extraction.

AB - Most company and organizations manage personnel, account, logistics etc through the database system. The business data stored these database is very important to investigate company dishonest act in the view of the digital forensics. However, it is difficult to extract meaningful data without blueprints because the table inside the database has exceedingly complicated relation and the role of the table and field in the table was so ambiguous. If we don't obtain the database's database or even if we get, but don't understand relationship in the table and meaning of each field, we cannot obtain the significant evidences. Therefore, the investigator should confirm the contents of the database blueprints and check the relationship between the table and hidden table which unsigned blueprints. In this paper, we improve the DBRE (database reverse engineering) process and analyze the table relationship of database and data extraction method in the view of the digital forensics. Moreover we proposed the efficient tool which more easily acquires digital evidences from databases using table relationship and data extraction.

KW - DB forensic

KW - ERP

KW - Table relationship

UR - http://www.scopus.com/inward/record.url?scp=80655134655&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80655134655&partnerID=8YFLogxK

U2 - 10.1109/CSA.2009.5404235

DO - 10.1109/CSA.2009.5404235

M3 - Conference contribution

AN - SCOPUS:80655134655

SN - 9781424449460

BT - Proceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009

ER -