Database Forensic Analysis with DBCarver
نویسندگان
چکیده
The increasing use of databases in the storage of critical and sensitive information in many organizations has lead to an increase in the rate at which databases are exploited in computer crimes. While there are several techniques and tools available for database forensics, they mostly assume apriori database preparation, such as relying on tamper-detection software to be in place or use of detailed logging. Investigators, alternatively, need forensic tools and techniques that work on poorly-configured databases and make no assumptions about the extent of damage in a database. In this paper, we present DBCarver, a tool for reconstructing database content from a database image without using any log or system metadata. The tool uses page carving to reconstruct both query-able data and non-queryable data (deleted data). We describe how the two kinds of data can be combined to enable a variety of forensic analysis questions hitherto unavailable to forensic investigators. We show the generality and efficiency of our tool across several databases through a set of robust experiments. CCS Concepts •Security and privacy → Information accountability and usage control; Database activity monitoring;
منابع مشابه
A Generalizing Database Forensics
In this paper we present refinements on previously-proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the “where” axis of the corruption diagram. Specifically, we introduce page-based partitioning as well as attribute-based partitioning along with their associated corruption diagra...
متن کاملScope of Practice of Forensic Midwifery: An Integrative Review
Background & aim: Forensic midwifery is a new major which has been established in response to the need of endangered women for forensic services and also the lack of service provision in this domain. However, there are ambiguities in the definition of this major and its scope of practice. The present study was conducted to investigate the scope of practice in forensic ...
متن کاملIntegrating forensic information in a crime intelligence database.
Since 2008, intelligence units of six states of the western part of Switzerland have been sharing a common database for the analysis of high volume crimes. On a daily basis, events reported to the police are analysed, filtered and classified to detect crime repetitions and interpret the crime environment. Several forensic outcomes are integrated in the system such as matches of traces with pers...
متن کاملDatabase Security Threats and Challenges in Database Forensic: A Survey
Relational Database Management Systems (RDBMS) is collection of applications that manage the storage, retrieval, and manipulation of database data. At the industry level SQL Server, Oracle, Sybase, DB2, MySQL, and other popular database applications are widely accepted as RDBMSs. As in the current scenario large data security breaches are occurring at a very high rate so we aim here to excavate...
متن کاملDigital Evidence for Database Tamper Detection
Most secure database is the one you know the most. Tamper detection compares the past and present status of the system and produces digital evidence for forensic analysis. Our focus is on different methods or identification of different locations in an oracle database for collecting the digital evidence for database tamper detection. Starting with the basics of oracle architecture, continuing w...
متن کامل