منابع مشابه
Database application schema forensics
The application schema layer of a Database Management System (DBMS) can be modified to produce results that do not reflect the data actually stored in the database. For example, table structures may be corrupted by changing the metadata of a database, or operators of the database can be altered to produce incorrect results when used in queries. Such incorrect results may lead to a forensic exam...
متن کاملImage Retrieval in Forensics: Application to Tattoo Image Database
The continuing growth of and increasing dependence on forensic image databases require fast and reliable image matching and retrieval techniques. We present a content-based image retrieval (CBIR) system for a particular forensic image database, namely a large collection of tattoo images. The system employs a local point descriptor to represent images, and, given a query tattoo image, it retriev...
متن کاملA Generalizing Database Forensics
In this paper we present refinements on previously-proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the “where” axis of the corruption diagram. Specifically, we introduce page-based partitioning as well as attribute-based partitioning along with their associated corruption diagra...
متن کاملReconstruction in Database Forensics
The increasing usage of databases in the storage of critical and sensitive information in many organizations has led to an increase in the rate at which databases are exploited in computer crimes. Databases are often manipulated to facilitate crimes and as such are usually of interest during many investigations as useful information relevant to the investigation can be found therein. A branch o...
متن کاملAssembling Metadata for Database Forensics
Since information is often a primary target in a computer crime, organizations that store their information in database management systems (DBMSs) must develop a capability to perform database forensics. This paper describes a database forensic method that transforms a DBMS into the required state for a database forensic investigation. The method segments a DBMS into four abstract layers that s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: South African Computer Journal
سال: 2014
ISSN: 2313-7835,1015-7999
DOI: 10.18489/sacj.v55i0.188