CFP last date
20 May 2024
Reseach Article

Forensic Analysis Algorithm: By using the Tiled Bitmap with Audit Log Mechanism

by Piyush P. Gawali
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 63 - Number 11
Year of Publication: 2013
Authors: Piyush P. Gawali
10.5120/10513-5483

Piyush P. Gawali . Forensic Analysis Algorithm: By using the Tiled Bitmap with Audit Log Mechanism. International Journal of Computer Applications. 63, 11 ( February 2013), 36-42. DOI=10.5120/10513-5483

@article{ 10.5120/10513-5483,
author = { Piyush P. Gawali },
title = { Forensic Analysis Algorithm: By using the Tiled Bitmap with Audit Log Mechanism },
journal = { International Journal of Computer Applications },
issue_date = { February 2013 },
volume = { 63 },
number = { 11 },
month = { February },
year = { 2013 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume63/number11/10513-5483/ },
doi = { 10.5120/10513-5483 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:14:05.229029+05:30
%A Piyush P. Gawali
%T Forensic Analysis Algorithm: By using the Tiled Bitmap with Audit Log Mechanism
%J International Journal of Computer Applications
%@ 0975-8887
%V 63
%N 11
%P 36-42
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The set of policies and the group of people need to access the valuable database by the authorized inter mediator, still the organizational employee also go through the authorized inter mediator. Cryptographic hashing is one of the best approach and work as a inter mediator. This paper show how to resolve when tampering arises in Database, what data was tampered and the identification of the person to tamper the data. These things are detected by using the forensic analysis. This paper presents a new forensic analysis algorithm, the tiled bitmap algorithm, which is more capable then the previous algorithm. It introduces the concept of a candidate set (all possible place of detected tampering(s)) and gives a full classification of the candidate set and its cardinality and prevent the intruder, the computing of the candidate set is also presented. There are certain cases happened in BANK and other sector where the data has been tamper by the assessor, outsider or by the employees of the organizations. The separate audit logs validate to observe and inspect the database along with the extra information and state of the data. Audit log play a central role in database. The space and time complexity is less in this forensic analysis algorithm.

References
  1. CSI/FBI, "Tenth Annual Computer Crime and Security Survey,"July2005,http://www. cpppe. umd. edu/Bookstore/Documents/2005CSISurvey. pdf (accessed April 16, 2009).
  2. P. A. Gerr, B. Babineau, and P. C. Gordon, "Compliance: the effect on information management and the storage industry, "Enterprise Storage Group Technical Report, May 2003,http://www. enterprisestrategygroup. com/ESGPublications/ReportDetail. asp?ReportID=201 (accessed April 21, 2009).
  3. M. T. Goodrich, M. J. Atallah, and R. Tamassia, "Indexing Information for Data Forensics," in Proceedings of the Conference on Applied Cryptography and Network Security, Springer Lecture Notes in Computer Science 3531, pp. 206–221, 2005.
  4. B. Li, M. S. Hsiao, and S. Sheng, "A Novel SAT All-Solutions Solver for Efficient Pre image Computation," in Proceedings of the IEEE International Conference on Design, Automation and Test in Europe, Volume 1, February 2004.
  5. M. Malmgren,"An infrastructure for database tamper detection and forensic analysis and forensic analysis", Honor Thesis university of Arizona, may 2007.
  6. J. Mena, Investigative Data Mining for Security and Criminal Detection, Butterworth Heinemann, 2003.
  7. K. E. Pavlou and R. T. Snodgrass, "Forensic Analysis of Database Tampering," in Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 109–120, Chicago, June, 2006.
  8. K. E. Pavlou and R. T. Snodgrass, "Forensic Analysis of Database Tampering," ACM Transactions on Database Systems33 (4): Article 30, 47+25 pages, November 2008.
  9. S. Sheng and M. S. Hsiao, "Efficient Pre image Computation Using A Novel Success-Driven ATPG," in Proceedings of the IEEE International Conference on Design, Automation and Test in Europe, Volume 1, March 2003.
  10. R. T. Snodgrass, S. S. Yao, and C. Collberg, "Tamper Detection in Audit Logs," in Proceedings of the International Conference on Very Large Databases, pp. 504–515, Toronto, Canada, September 2004.
  11. C. Strachey, "Bitwise operations," Communications of the ACM4 (3):146, March 1961.
  12. U. S. Dept. of Health & Human Services, The Health Insurance Portability and Accountability Act (HIPAA), 1996, http://www. cms. hhs. gov/HIPAAGenInfo/ (accessed April 16, 2009).
  13. U. S. Public Law No. 107-204, 116 Stat. 745. The Public Company Accounting Reform and Investor Protection Act, 2002.
  14. K. E. Pavlou and R. T. Snodgrass (2010, April). The Tiled Bitmap Forensic Analysis Algorithm. IEEE Transactions on Knowledge and Data Engineering, 22(4):590-601.
  15. "Forensic Analysis of Database Tampering", K. E. Pavlou and R. T. Snodgrass, Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 109-120, June 2006.
  16. Amit Basu, Article on Forensic Tamper Detection is SQL Server Tables, http://www. sqlsecurity. com
  17. S. Haber and W. S. Stornetta, "How to Time-Stamp a Digital Document," Journal of Cryptology 3:99–111, 1999.
  18. Mostar, Bosnina and Herzegovina, 2009 International Conference on Computer Engineering and Applications IPCSIT vol. 2 (2011) © (2011) IACSIT Press, Singapore
  19. Pallavi D Abhonkar et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 3 (5), 2012, 5078-5085.
Index Terms

Computer Science
Information Sciences

Keywords

Compliant Record Tiled Bitmap Algorithm database tampering Forensic cost Database Management integrity and protection Validator candidate set audited table MD5