2009 2nd International Conference on Computer Science and Its Applications 2009
DOI: 10.1109/csa.2009.5404207
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Connection Information for Database Server Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 4 publications
0
2
0
Order By: Relevance
“…Such a prototype aims to improve the security rules of DBMSs by implementing tampering detection and a forensic analysis system designed to determine when tampering(s) occurred and what data were tampered with. Similar to log analysis, Han et al (2009) propose client-based methods for detecting specific databases in target companies by analyzing connection information of the database server, which DBMSs store on the client-side. They introduce a tool that can automatically extract and analyze this information to collaborate with forensic investigations and improve security rules.…”
Section: Dbms Publications Analysis and Discussionmentioning
confidence: 99%
“…Such a prototype aims to improve the security rules of DBMSs by implementing tampering detection and a forensic analysis system designed to determine when tampering(s) occurred and what data were tampered with. Similar to log analysis, Han et al (2009) propose client-based methods for detecting specific databases in target companies by analyzing connection information of the database server, which DBMSs store on the client-side. They introduce a tool that can automatically extract and analyze this information to collaborate with forensic investigations and improve security rules.…”
Section: Dbms Publications Analysis and Discussionmentioning
confidence: 99%
“…Such information can be acquired by investigating the host computers inside a company. Out of all the information acquired, it is possible to find important information such as account information, which leads to connecting to the database server, so it can be highly utilized for an actual forensic investigation .…”
Section: Related Workmentioning
confidence: 99%