CFP last date
21 October 2024
Reseach Article

Evidences Collection Methodologies for Forensic Investigation of Databases

Published on June 2015 by P.d. Bodakhe
National Conference on Recent Trends in Computer Science and Engineering
Foundation of Computer Science USA
MEDHA2015 - Number 3
June 2015
Authors: P.d. Bodakhe
9065fdcf-4715-462e-bcd6-dd9418891054

P.d. Bodakhe . Evidences Collection Methodologies for Forensic Investigation of Databases. National Conference on Recent Trends in Computer Science and Engineering. MEDHA2015, 3 (June 2015), 15-17.

@article{
author = { P.d. Bodakhe },
title = { Evidences Collection Methodologies for Forensic Investigation of Databases },
journal = { National Conference on Recent Trends in Computer Science and Engineering },
issue_date = { June 2015 },
volume = { MEDHA2015 },
number = { 3 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 15-17 },
numpages = 3,
url = { /proceedings/medha2015/number3/21441-8038/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Computer Science and Engineering
%A P.d. Bodakhe
%T Evidences Collection Methodologies for Forensic Investigation of Databases
%J National Conference on Recent Trends in Computer Science and Engineering
%@ 0975-8887
%V MEDHA2015
%N 3
%P 15-17
%D 2015
%I International Journal of Computer Applications
Abstract

In today's era of computing, data is a crucial entity. To store this important data and information most company and organizations uses database, i. e. they manage personnel, account, logistics etc. through the database system. Exponential usage of modern information technologies also causes the growth of computer crime which has the main goal to profit illegally, industrial espionage, forgery, falsification of data and any other illegal activity. These manipulations can be made by authorized or unauthorized users. As the business data stored in these database is very important, to investigate company dishonest act is necessary, for that purpose fruitful database forensic technique should be used. The fact that classical methods of collecting digital evidence are not appropriate and efficient and some good evidence collection methodologies are mentioned here which are useful for forensic investigation of database.

References
  1. Lee D. , Choi J. , Lee S. , "Database Forensic Investigation based on Table Relationship Analysis Techniques" 978-1-4244-4946-0/09/$25. 00 ©2009 IEEE
  2. Frühwirt P. , Huber M. , Mulazzani M. , Edgar R. Weippl, "InnoDB Database Forensics" 1550-445X/10 $26. 00 © 2010 IEEE DOI 10. 1109/AINA. 2010. 152
  3. Kari Silpiö, " DATABASEREVERSE ENGINEERING" DBTech_EXT Workshop in Thessaloniki 2009-09-10
  4. Michael T. Goodrich, Mikhail J. Atallah, and Roberto Tamassia, "Indexing Information for Data Forensics", J. Ioannidis, A. Keromytis, and M. Yung (Eds. ): ACNS 2005, LNCS 3531, pp. 206–221, 2005. _c Springer-Verlag Berlin Heidelberg 2005
  5. "SQL Server Database Forensic" USA 2007
  6. Dowming Yeh, Yuwen Li, William Chu, "Extracting entity-relationship diagram from a table-based legacy database". in proc. The Journal of Systems and Software 81, Elsevier Science Ltd, 764–771, 26 July 2007.
  7. Pavlou K. and Richard T. Snodgrass, "Forensic Analysis of Database Tampering" SIGMOD'06, June 27–29, 2006, Chicago, Illinois, USA.
  8. Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine, "Threats to Privacy in the Forensic Analysis of Database Systems" SIGMOD'07, June 12–14, 2007, Beijing, China. Copyright 2007
  9. Irina Astrova and Bela Stantic, "Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms"
  10. Natash Ali Mian and Tauqeer Hussain, "Database Reverse Engineering Tools" 7th WSEAS Int. Conf. on SOFTWARE ENGINEERING, PARALLEL and DISTRIBUTED SYSTEMS (SEPADS '08), University of Cambridge, UK, Feb 20-22, 2008
  11. Azemovic J. and Music D. , "Methods For Efficient Digital Evidences Collecting Of Business Proceses And Users Activity In eLearning Enviroments" 978-0-7695-3948-5/10 $26. 00 © 2010 IEEE DOI 10. 1109/IC4E. 2010. 92
  12. "Oracle Database Forensics using LogMiner" © SANS Institute 2005
  13. Kyriacos E. Pavlou and Richard T. Snodgrass, " The Tiled Bitmap Forensic Analysis Algorithm"
  14. S. A. Belgium, "REVER- Database Reverse Engineering" +32 71 20 71 61 ; http://www. rever. eu
  15. Jean-Luc Hainaut, "Introduction to Database Reverse Engineering" LIBD - Laboratory of Database Application Engineering Institute d'Informatique - University of Namur (Belgium) May 2002
  16. Alhajj R. and Polat F. , Database Reverse Engineering, Proc. Eighth Working Conf. on Reverse Engineering, Stuttgart, Germany, 335-344, (2001).
Index Terms

Computer Science
Information Sciences

Keywords

Digital Evidence Digital Forensics Database Audit Logging.