CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Database Tamper Detection and Analysis

by Shagufta Rajguru, Deepak Sharma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 105 - Number 15
Year of Publication: 2014
Authors: Shagufta Rajguru, Deepak Sharma
10.5120/18452-9322

Shagufta Rajguru, Deepak Sharma . Database Tamper Detection and Analysis. International Journal of Computer Applications. 105, 15 ( November 2014), 14-17. DOI=10.5120/18452-9322

@article{ 10.5120/18452-9322,
author = { Shagufta Rajguru, Deepak Sharma },
title = { Database Tamper Detection and Analysis },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 105 },
number = { 15 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume105/number15/18452-9322/ },
doi = { 10.5120/18452-9322 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:37:46.553263+05:30
%A Shagufta Rajguru
%A Deepak Sharma
%T Database Tamper Detection and Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 105
%N 15
%P 14-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Database as an enterprise data information aggregation is a core component its security is essential. The data and the metadata when exposed to the outside world may endanger the security of the DBMS. Therefore securing data and assuring that the database should be accessed by authorized users is necessary. In this study we have understood the architecture of oracle 10g [1] and studied different queries that can be fired to retrieve the facts and details form the system log files and redo log files from the oracle database. A proposed design of a forensic tool that will detect the tamper on the content of the database and analyze when, where and who did the tamper on the database is stated.

References
  1. Oracle Database 10g DBA Handbook
  2. http://www. techopedia. com/definition/27805/digital-forensics
  3. Oracle Database Forensics using LogMiner Option 3 - Perform Forensic Tool Validation GCFA Assignment Version 2. 0 Paul M. Wright - GSEC, GCFW, GCIH January 10th 2005 from London June 2004 Conference
  4. Tamper Detection in Audit Logs Richard T. Snodgrass, Shilong Stanley Yao and Christian Collberg University of Arizona Department of Computer Science Tucson, AZ 85721-0077 USA frts,yao,collbergg@cs. arizona. edu
  5. Litchfield, David. "Oracle forensics part 1: Dissecting the redo logs. "NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton (2007).
  6. Litchfield, David. "Oracle forensics part 2: Locating dropped objects. "NGSSoftware Insight Security Research (NISR) (2007).
  7. Litchfield, David. "Oracle Forensics: Part 3 Isolating Evidence of Attacks Against the Authentication Mechanism. " NGSSoftware Insight Security Research (NISR) (2007).
  8. Litchfield, David. "Oracle forensics part 4: Live response. " NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton(2007).
  9. Litchfield, David. "Oracle forensics part 6: Examining undo segments, flashback and the oracle recycle bin. " NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton (2007).
  10. Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Investigations David Litchfield [davidl@ngssoftware. com]
  11. Shweta Tripathi,Sindhu. K. K , Dr. B. B. Meshram "Digital Forensic Investigation on File System And Database Tampering " IOSR Journal of Engineering (IOSRJEN) www. iosrjen. org ISSN : 2250-3021 Vol. 2 Issue 2, Feb. 2012, pp. 214-221 www. iosrjen. org 214 | P a g e
  12. Shweta Tripathi, Bandu Baburao Meshram "Digital Evidence for Database Tamper Detection" Journal of Information Security, 2012, 3, ***-*** Published Online April 2012 (http://www. SciRP. org/journal/jis)
Index Terms

Computer Science
Information Sciences

Keywords

Database Oracle 10g database tamper database forensic