• DocumentCode
    120646
  • Title

    “Role of metadata in forensic analysis of database attacks“

  • Author

    Khanuja, Harmeet ; Suratkar, Shraddha S.

  • Author_Institution
    Dept. of Comput. Eng., MMCOE, Pune, India
  • fYear
    2014
  • fDate
    21-22 Feb. 2014
  • Firstpage
    457
  • Lastpage
    462
  • Abstract
    With the spectacular increase in online activities like e-transactions, security and privacy issues are at the peak with respect to their significance. Large numbers of database security breaches are occurring at a very high rate on daily basis. So, there is a crucial need in the field of database forensics to make several redundant copies of sensitive data found in database server artifacts, audit logs, cache, table storage etc. for analysis purposes. Large volume of metadata is available in database infrastructure for investigation purposes but most of the effort lies in the retrieval and analysis of that information from computing systems. Thus, in this paper we mainly focus on the significance of metadata in database forensics. We proposed a system here to perform forensics analysis of database by generating its metadata file independent of the DBMS system used. We also aim to generate the digital evidence against criminals for presenting it in the court of law in the form of who, when, why, what, how and where did the fraudulent transaction occur. Thus, we are presenting a system to detect major database attacks as well as anti-forensics attacks by developing an open source database forensics tool. Eventually, we are pointing out the challenges in the field of forensics and how these challenges can be used as opportunities to stimulate the areas of database forensics.
  • Keywords
    data privacy; digital forensics; law; meta data; antiforensics attacks; audit logs; cache; court of law; database attacks; database security breaches; database server artifacts; digital evidence; e-transactions; forensic analysis; fraudulent transaction; information analysis; information retrieval; metadata; online activities; open source database forensics tool; privacy issue; security issue; table storage; Conferences; Handheld computers; Database forensics; SQL injection; anti-forensics attacks; digital notarization; linked hash technique; metadata; reconnaissance attack; trail obfuscation;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Advance Computing Conference (IACC), 2014 IEEE International
  • Conference_Location
    Gurgaon
  • Print_ISBN
    978-1-4799-2571-1
  • Type

    conf

  • DOI
    10.1109/IAdCC.2014.6779367
  • Filename
    6779367