CFP last date
22 April 2024
Reseach Article

Comparative Analysis of Database Forensic Algorithms

Published on July 2015 by Manish H. Bhagwani, Rajiv V. Dharaskar, V. M. Thakare
National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
Foundation of Computer Science USA
NCKITE2015 - Number 3
July 2015
Authors: Manish H. Bhagwani, Rajiv V. Dharaskar, V. M. Thakare
b459769d-e2a1-480a-891c-f3ed00270c3a

Manish H. Bhagwani, Rajiv V. Dharaskar, V. M. Thakare . Comparative Analysis of Database Forensic Algorithms. National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015). NCKITE2015, 3 (July 2015), 33-36.

@article{
author = { Manish H. Bhagwani, Rajiv V. Dharaskar, V. M. Thakare },
title = { Comparative Analysis of Database Forensic Algorithms },
journal = { National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015) },
issue_date = { July 2015 },
volume = { NCKITE2015 },
number = { 3 },
month = { July },
year = { 2015 },
issn = 0975-8887,
pages = { 33-36 },
numpages = 4,
url = { /proceedings/nckite2015/number3/21497-2668/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%A Manish H. Bhagwani
%A Rajiv V. Dharaskar
%A V. M. Thakare
%T Comparative Analysis of Database Forensic Algorithms
%J National Conference on Knowledge, Innovation in Technology and Engineering (NCKITE 2015)
%@ 0975-8887
%V NCKITE2015
%N 3
%P 33-36
%D 2015
%I International Journal of Computer Applications
Abstract

Security is major concern in data outsourcing environment, since data is under the custody of third party service provider in many cases. In present systems, third partycan access & view data even though they are not authorized todo so or even when the data is outsourced to the auditors orallow the employee of the organization to do the updating in the database. This may lead to the serious data theft, data tampering & even data leakages causing severe business impact to data owner. Digital Forensic analysis of databases helps to solve the problem. In this paper various database tamper detection algorithms are studied and compared based on space and time complexities.

References
  1. K. E. Pavlou and R. T. Snodgrass. 2010"The tiled bitmap forensic analysis algorithm", IEEE transaction on knowledge and data engineering,Vol. 22, pp no. 590-601, April 2010
  2. CSI/FBI. 2009. "Tenth Annual Computer Crime and Security Survey, http://www. cpppe. um. edu/Bookstore/ Documents/2005CSISurvey. pdf, 2009.
  3. M. Malmgren, 2009. "An Infrastructure for Database Tamper Detection and Forensic Analysis", honors thesis, University of Arizona, available at http://www. cs. arizona. edu/projects/tau/tbdb/MelindaMalmgrenThesis. pdf, 2009.
  4. U. S. Dept. of Health & Human Services. 2009. "The Health Insurance Portability and Accountability Act (HIPAA)," available at http://www. cms. hhsGov/HIPAAGenInfo/, 2009.
  5. J. Mena, Butterworth Heinemann. 2003. "Investigative Data Mining for Security and Criminal Detection. 2003.
  6. M. T. Goodrich, M. J. Atallahand, and R. Tamassia, 2005. "Indexing Information for Data Forensics", Proc. Conf. Applied Cryptography and Network Security, pp. 206-221, 2005.
  7. R. T. Snodgrass, S. S. Yao, and C. Collberg, 2004. "Tamper Detection in Audit Logs", Proc. Int'l Conf. Very Large Databases, pages 504-515, Sept. 2004.
  8. K. E. Pavlou and R. T. Snodgrass. 2006. "Forensic Analysis of Database Tampering", Proc. ACM SIGMOD Int'l Conf. Management of Data, pages 109-120, June 2006.
  9. K. E. Pavlou and R. T. Snodgrass. 2008. "Forensic Analysis of Database Tampering", ACM Trans. Database Systems, vol. 33, no. 4, pages 1-47,Nov. 2008.
  10. Microsoft SQL Server 2000 [Online] Available: http://www. quackit. com/sql_server/sql_servr_2000/tutorial/about_sql_server. cfm
  11. Yamanishi, K. and Maruyama, Y. , "Dynamic syslog mining for network failure monitoring," In KDD'05: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, pp. 499–508, New York, NY, USA. ACM, 2005.
  12. Facca, F. M. and Lanzi, P. L. , "Mining interesting knowledge from weblogs: a survey," Data Knowledge Engineering, vol. 53(3), pp. 225–241, 2005.
  13. Li, D. H. , Laurent, A. , and Poncelet, P. , "Mining unexpected web usage behaviors," In ICDM, pages 283–297, 2008.
  14. Harmeet Kaur Khanuja and Dr. D. S. Adane, 2011. "Database Security Threats and challenges in Database Forensic: A survey", Proceedings of 2011 International Conference on Advancements in Information Technology (AIT 2011), available at http://www. ipcsit. com/vol20/33-ICAIT2011- A4072. pdf, 2011.
  15. Kyriacos Pavlou, 2011. "Database Forensics in the Service of Information Accountability", Available at http://www. cs. arizona. edu/projects/tau/dragoon/
  16. Paul M. Wright, 2005. "Oracle Database Forensics using LogMiner", June 2004 Conference, SANS Institute, pages 1-39, 2005.
  17. Geoff H. Fellows, 2005. "The joys of complexity and the deleted file", Digital Investigation (Elsevier), Vol. 2, pages 89-93, February 2005.
  18. Garfinkel Simson, 2006. "Forensic feature extraction and cross-drive analysis", Digit Investigation (Elsevier), http://www. dfrws. org/2006/proceedings/10-Garfinkel. pdf, pages 71-81, August, 2006.
  19. Carrier Brian, 2005. "The Sleuth Kit & Autopsy: forensics tools for Linux and other Unixes", http://www. sleuthkit. org, 2005.
  20. Ewa Huebner, Derek Bem, Cheong Kai Wee, 2006. "Data hiding in the NTFS file system", Digital Investigation (Elsevier), pages 211-226, March 2006.
  21. D. Litchfield, 2007. "Oracle Forensics Redo Logs," NGS Software Insight Security Research (NI- SR), Next Generation Security Software Ltd. , Sutton, 2007.
  22. D. Litchfield, 2007. "Oracle Forensics Part 2: Locating Dropped Objects," NGS Software Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  23. D. Litchfield, 2007. "Oracle Forensics Part 3: Isolating Evidence of Attacks against the Authentication Mechanism," NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  24. D. Litchfield, 2007. "Oracle Forensics Part 4: Live NGSSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  25. D. Litchfield, 2007. "Oracle Forensics Part 5: Finding of Data Theft in the Absence of Auditing," NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  26. D. Litchfield 2007. "Oracle Forensics Part 6: Ex Segments, Flashback and the Oracle Recycle Bin," NGS Software Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2007.
  27. D. Litchfield, 2008. "Oracle Forensics Part 7: Using System Change Number in Forensic Investigations," NGSSoftware Insight Security Research (NISR), Next Generation Security Software Ltd. , Sutton, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Security Data Outsourcing Forensic Analysis Digital Forensic Tamper Detection Algorithms