Forensic Analysis of Databases by Combining Multiple Evidences

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 3

Abstract

The information security for securing enterprise databases from internal and external attacks and violations of mutual policy is an interminable struggle. With the growing number of attacks and frauds, the organizations are finding it difficult to meet various regulatory compliance requirements such as SOX, HIPAA, and state privacy laws. The aim here is to develop a methodology which monitors the database transactions on continuous basis and to make a decision whether the database transactions are legitimate or suspicious by combining multiple evidences gathered. The suspicious transactions can then be used for forensic analysis to reconstruct the illegal activity carried out in an organization. This can be achieved by incorporating information accountability in Database Management System. Information accountability means, the information usage should be transparent so that it is possible to determine whether a use is appropriate under a given set of rules. We focus on effective information accountability of data stored in high-performance databases through database forensics which collects and analyses database transactions collected through various sources and artifacts like data cache, log files, error logs etc. having volatile or non-volatile characteristics within high performance databases. The information and multiple evidences collected are then analyzed using an Extended Dempster-Shafer theory(EDST). It  combines multiple such evidences and an initial belief is computed for suspected transactions which can be further used for reconstructing the activity in database forensics process.

Authors and Affiliations

Harmeet Kaur Khanuja, Dr. D. S. Adane

Keywords

Related Articles

Performance Analysis of Wireless Communication Systems Traffic using Erlang Models: A Case Study of Yankari Game Reserve in Nigeria

In any developing nation such as Nigeria, the level of her telecommunication and ICT development is an issue that requires adequate planning especially when consideration is given to the amount of traffic and the availab...

Computer Aided Diagnosis of Melanoma Skin Cancer using Clinical Photographic Images

Melanoma is considered as one of the most malignant, metastatic and dangerous form of skin cancer that may cause death. The curability and survival of this type of skin cancer depends directly on the diagnosis and remova...

Data Security In Cloud Computing: A Review

Cloud computing is Internet ("cloud") based development and use of computer technology ("computing"). It is a style of computing in which dynamically scalable and often virtualized resources are provided as a service ove...

Design of BPSK Modulator Using VHDL

Binary Phase Shift Keying represents the simulation results of binary digital modulation schemes. Here for BASK and BPSK modulation techniques use FPGA algorithm. If multiplier block is used for multiplication bit stream...

POWER EFFICIENT TASK SCHEDULING MECHANISM IN CLOUD ENVIRONMENT: A REVIEW

Cloud Computing is being used widely all over the world by many IT companies as it provides various benefits to the users like cost saving and ease of use. However, with the growing demands of users for computing service...

Download PDF file
  • EP ID EP650072
  • DOI 10.24297/ijct.v7i3.3446
  • Views 86
  • Downloads 0

How To Cite

Harmeet Kaur Khanuja, Dr. D. S. Adane (2013). Forensic Analysis of Databases by Combining Multiple Evidences. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 7(3), 654-663. https://europub.co.uk/articles/-A-650072