Forensic Analysis of Databases by Combining Multiple Evidences

Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 7, Issue 3

Abstract

The information security for securing enterprise databases from internal and external attacks and violations of mutual policy is an interminable struggle. With the growing number of attacks and frauds, the organizations are finding it difficult to meet various regulatory compliance requirements such as SOX, HIPAA, and state privacy laws. The aim here is to develop a methodology which monitors the database transactions on continuous basis and to make a decision whether the database transactions are legitimate or suspicious by combining multiple evidences gathered. The suspicious transactions can then be used for forensic analysis to reconstruct the illegal activity carried out in an organization. This can be achieved by incorporating information accountability in Database Management System. Information accountability means, the information usage should be transparent so that it is possible to determine whether a use is appropriate under a given set of rules. We focus on effective information accountability of data stored in high-performance databases through database forensics which collects and analyses database transactions collected through various sources and artifacts like data cache, log files, error logs etc. having volatile or non-volatile characteristics within high performance databases. The information and multiple evidences collected are then analyzed using an Extended Dempster-Shafer theory(EDST). It  combines multiple such evidences and an initial belief is computed for suspected transactions which can be further used for reconstructing the activity in database forensics process.

Authors and Affiliations

Harmeet Kaur Khanuja, Dr. D. S. Adane

Keywords

Related Articles

A Group Collaboratable Proof of Retrievability Scheme for Cloud Data Storage

Cloud computing and cloud data storage have become important applications on the Internet. An important trend in cloud computing and cloud data storage is group collaboration since it is a great inducement for an entity...

Evaluation of Operation of Lake Tana Reservoir Future Water Use under Emerging Scenario with and without climate Change Impacts, Upper Blue Nile

This paper presents simulation of Lake Tana reservoir future water use under emerging scenario with and without climate change impacts. Two different development and climate change scenarios were developed to simulat...

A Comparative Analysis of Feed-Forward and Generalized Regression Neural Networks for Face Recognition Using Principal Component Analysis

In this paper we give a comparative analysis of performance of feed forward neural network and generalized regression neural network based face recognition. We use different inner epoch for different input pattern accor...

Raspberry Pi for Commercial Applications

The objective of this paper is to create a low cost commercial off the shelf data analyzer for improving automotive safety and design a user interface infotainment system by using Raspberry Pi.  In this paper we propose...

A Three-stage Methodology for Design Evaluation in Product Development

In order to remain competitive in today‟s technologically driven world, the faster and more efficient development of innovative products has become the focus for manufacturing companies. In tandem with this, design eva...

Download PDF file
  • EP ID EP650072
  • DOI 10.24297/ijct.v7i3.3446
  • Views 87
  • Downloads 0

How To Cite

Harmeet Kaur Khanuja, Dr. D. S. Adane (2013). Forensic Analysis of Databases by Combining Multiple Evidences. INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 7(3), 654-663. https://europub.co.uk/articles/-A-650072