Call for Paper - November 2020 Edition
IJCA solicits original research papers for the November 2020 Edition. Last date of manuscript submission is October 20, 2020. Read More

Comparative Analysis of Database Forensic Algorithms

Print
PDF
IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
© 2015 by IJCA Journal
NCKITE 2015 - Number 3
Year of Publication: 2015
Authors:
Manish H. Bhagwani
Rajiv V. Dharaskar
V. M. Thakare

Manish H Bhagwani, Rajiv V Dharaskar and V M Thakare. Article: Comparative Analysis of Database Forensic Algorithms. IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) NCKITE 2015(3):33-36, July 2015. Full text available. BibTeX

@article{key:article,
	author = {Manish H. Bhagwani and Rajiv V. Dharaskar and V. M. Thakare},
	title = {Article: Comparative Analysis of Database Forensic Algorithms},
	journal = {IJCA Proceedings on National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)},
	year = {2015},
	volume = {NCKITE 2015},
	number = {3},
	pages = {33-36},
	month = {July},
	note = {Full text available}
}

Abstract

Security is major concern in data outsourcing environment, since data is under the custody of third party service provider in many cases. In present systems, third partycan access & view data even though they are not authorized todo so or even when the data is outsourced to the auditors orallow the employee of the organization to do the updating in the database. This may lead to the serious data theft, data tampering & even data leakages causing severe business impact to data owner. Digital Forensic analysis of databases helps to solve the problem. In this paper various database tamper detection algorithms are studied and compared based on space and time complexities.

References

  • K. E. Pavlou and R. T. Snodgrass. 2010"The tiled bitmap forensic analysis algorithm", IEEE transaction on knowledge and data engineering,Vol. 22, pp no. 590-601, April 2010
  • CSI/FBI. 2009. "Tenth Annual Computer Crime and Security Survey, http://www. cpppe. um. edu/Bookstore/ Documents/2005CSISurvey. pdf, 2009.
  • M. Malmgren, 2009. "An Infrastructure for Database Tamper Detection and Forensic Analysis", honors thesis, University of Arizona, available at http://www. cs. arizona. edu/projects/tau/tbdb/MelindaMalmgrenThesis. pdf, 2009.
  • U. S. Dept. of Health & Human Services. 2009. "The Health Insurance Portability and Accountability Act (HIPAA)," available at http://www. cms. hhsGov/HIPAAGenInfo/, 2009.
  • J. Mena, Butterworth Heinemann. 2003. "Investigative Data Mining for Security and Criminal Detection. 2003.
  • M. T. Goodrich, M. J. Atallahand, and R. Tamassia, 2005. "Indexing Information for Data Forensics", Proc. Conf. Applied Cryptography and Network Security, pp. 206-221, 2005.
  • R. T. Snodgrass, S. S. Yao, and C. Collberg, 2004. "Tamper Detection in Audit Logs", Proc. Int'l Conf. Very Large Databases, pages 504-515, Sept. 2004.
  • K. E. Pavlou and R. T. Snodgrass. 2006. "Forensic Analysis of Database Tampering", Proc. ACM SIGMOD Int'l Conf. Management of Data, pages 109-120, June 2006.
  • K. E. Pavlou and R. T. Snodgrass. 2008. "Forensic Analysis of Database Tampering", ACM Trans. Database Systems, vol. 33, no. 4, pages 1-47,Nov. 2008.
  • Microsoft SQL Server 2000 [Online] Available: http://www. quackit. com/sql_server/sql_servr_2000/tutorial/about_sql_server. cfm
  • Yamanishi, K. and Maruyama, Y. , "Dynamic syslog mining for network failure monitoring," In KDD'05: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pp. 499–508, New York, NY, USA. ACM, 2005.
  • Facca, F. M. and Lanzi, P. L. , "Mining interesting knowledge from weblogs: a survey," Data Knowledge Engineering, vol. 53(3), pp. 225–241, 2005.
  • Li, D. H. , Laurent, A. , and Poncelet, P. , "Mining unexpected web usage behaviors," In ICDM, pages 283–297, 2008.
  • Harmeet Kaur Khanuja and Dr. D. S. Adane, 2011. "Database Security Threats and challenges in Database Forensic: A survey", Proceedings of 2011 International Conference on Advancements in Information Technology (AIT 2011), available at http://www. ipcsit. com/vol20/33-ICAIT2011- A4072. pdf, 2011.
  • Kyriacos Pavlou, 2011. "Database Forensics in the Service of Information Accountability", Available at http://www. cs. arizona. edu/projects/tau/dragoon/
  • Paul M. Wright, 2005. "Oracle Database Forensics using LogMiner", June 2004 Conference, SANS Institute, pages 1-39, 2005.
  • Geoff H. Fellows, 2005. "The joys of complexity and the deleted file", Digital Investigation (Elsevier), Vol. 2, pages 89-93, February 2005.
  • Garfinkel Simson, 2006. "Forensic feature extraction and cross-drive analysis", Digit Investigation (Elsevier), http://www. dfrws. org/2006/proceedings/10-Garfinkel. pdf, pages 71-81, August, 2006.
  • Carrier Brian, 2005. "The Sleuth Kit & Autopsy: forensics tools for Linux and other Unixes", http://www. sleuthkit. org, 2005.
  • Ewa Huebner, Derek Bem, Cheong Kai Wee, 2006. "Data hiding in the NTFS file system", Digital Investigation (Elsevier), pages 211-226, March 2006.
  • D. Litchfield, 2007. "Oracle Forensics Redo Logs," NGS Software Insight Security Research (NI- SR), Next Generation Security Software Ltd. , Sutton, 2007.
  • D. Litchfield, 2007. "Oracle Forensics Part 2: Locating Dropped Objects," NGS Software Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  • D. Litchfield, 2007. "Oracle Forensics Part 3: Isolating Evidence of Attacks against the Authentication Mechanism," NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  • D. Litchfield, 2007. "Oracle Forensics Part 4: Live NGSSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  • D. Litchfield, 2007. "Oracle Forensics Part 5: Finding of Data Theft in the Absence of Auditing," NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  • D. Litchfield 2007. "Oracle Forensics Part 6: Ex Segments, Flashback and the Oracle Recycle Bin," NGS Software Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  • D. Litchfield, 2008. "Oracle Forensics Part 7: Using System Change Number in Forensic Investigations," NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2008.