کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
4955626 1364633 2017 10 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Carving database storage to detect and trace security breaches
ترجمه فارسی عنوان
ذخیره سازی پایگاه داده برای بروز و تشخیص نقص امنیتی
کلمات کلیدی
پایگاه داده های قانونی، کاغذ کاغذ، تجزیه و تحلیل حافظه،
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر شبکه های کامپیوتری و ارتباطات
چکیده انگلیسی

Database Management Systems (DBMS) are routinely used to store and process sensitive enterprise data. However, it is not possible to secure data by relying on the access control and security mechanisms (e.g., audit logs) of such systems alone - users may abuse their privileges (no matter whether granted or gained illegally) or circumvent security mechanisms to maliciously alter and access data. Thus, in addition to taking preventive measures, the major goal of database security is to 1) detect breaches and 2) to gather evidence about attacks for devising counter measures. We present an approach that evaluates the integrity of a live database, identifying and reporting evidence for log tampering. Our approach is based on forensic analysis of database storage and detection of inconsistencies between database logs and physical storage state (disk and RAM). We apply our approach to multiple DBMS to demonstrate its effectiveness in discovering malicious operations and providing detailed information about the data that was illegally accessed/modified.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Digital Investigation - Volume 22, Supplement, August 2017, Pages S127-S136
نویسندگان
, , , , , , ,