The effective method of database server forensics on the enterprise environment
نویسندگان
چکیده
When a forensic investigation is carried out in the enterprise environment, most of the important data are stored in database servers, and data stored in them are very important elements for a forensic investigation. As for database servers with such data stored, there are over 10 various kinds, such as SQL Server and Oracle. All the methods of investigating a database system are important, but this study suggests a single methodology likely to investigate all the database systems while considering the unique characteristics of each database system. A method of detecting a server and acquiring and investigating data in the server can be effectively used for such an investigation on the enterprise environment. For the existing investigation on server systems, severs should be shut down, and disc imaging should be conducted first. However, such a method may inflict great losses on the company in some cases. That is why we need a method to acquire data of a server in on-line state, and this study discusses this method. Besides, on the basis of methodology, this study attempts to determine a possibility that this new forensic investigation method can be practically used by directly applying this method to SQL Server and MySQL databases. Copyright © 2012 John Wiley & Sons, Ltd.
منابع مشابه
Separating indexes from data: a distributed scheme for secure database outsourcing
Database outsourcing is an idea to eliminate the burden of database management from organizations. Since data is a critical asset of organizations, preserving its privacy from outside adversary and untrusted server should be warranted. In this paper, we present a distributed scheme based on storing shares of data on different servers and separating indexes from data on a distinct server. Shamir...
متن کاملInvestigation on Reliability Estimation of Loosely Coupled Software as a Service Execution Using Clustered and Non-Clustered Web Server
Evaluating the reliability of loosely coupled Software as a Service through the paradigm of a cluster-based and non-cluster-based web server is considered to be an important attribute for the service delivery and execution. We proposed a novel method for measuring the reliability of Software as a Service execution through load testing. The fault count of the model against the stresses of users ...
متن کاملCritical Success Factors for Business Intelligence Implementation in an Enterprise Resource Planning System Environment Using DEMATEL: A Case Study at a Cement Manufacture Company in Indonesia
This paper is aimed at evaluating critical success factors in Business Intelligence (BI) implementation in an Enterprise Resource Planning (ERP) environment. The data analysis method used in this paper is the Decision Making Trial and Evaluation Laboratory Model (DEMATEL). The study has been conducted on a cement manufacturing strategic holding company that has implemented ERP since 2010. This ...
متن کاملModeling and Availability Analysis of Internet Data Center with various Maintenance Policies
In this paper, the authors have focused on the stochastic analysis of an internet data center (IDC), which consists of a database main server connected to a redundant server. Observing the different possibilities of functioning of the system, analysis has been done to evaluate the various reliability characteristics of the system. The system can completely fail due to failure of redundant serve...
متن کاملMerging Sub Evidence Graphs to an Integrated Evidence Graph for Network Forensics Analysis
Evidence graphs model network intrusion evidence and their dependen cies to help with network forensics analysis. With quantitative metrics, probabilistic evidence graphs provide a way to link probabilities associ ated with different attack paths with available evidence. Existing work in evidence graphs assumes that all available evidence forms a single evidence graph. We show how to merge di...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Security and Communication Networks
دوره 5 شماره
صفحات -
تاریخ انتشار 2012