2013
DOI: 10.1145/2487259.2487264
|View full text |Cite
|
Sign up to set email alerts
|

Generalizing database forensics

Abstract: In this article we present refinements on previously proposed approaches to forensic analysis of database tampering. We significantly generalize the basic structure of these algorithms to admit new characterizations of the "where" axis of the corruption diagram. Specifically, we introduce page-based partitioning as well as attribute-based partitioning along with their associated corruption diagrams. We compare the structure of all the forensic analysis algorithms and discuss the various design choices availabl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(10 citation statements)
references
References 17 publications
0
9
0
Order By: Relevance
“…Some works (Hu and Panda, 2005;Pavlou and Snodgrass, 2013) have approached recovering the database consistency after detecting that some data were corrupted due to a malicious activity (e.g., an intrusion). Hu and Panda (2005) have proposed a method for detecting malicious activities in a DBMS by using data dependency relationships, i.e., data items which must be read or written before a data item is updated and others which must be written after the update.…”
Section: Related Work Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…Some works (Hu and Panda, 2005;Pavlou and Snodgrass, 2013) have approached recovering the database consistency after detecting that some data were corrupted due to a malicious activity (e.g., an intrusion). Hu and Panda (2005) have proposed a method for detecting malicious activities in a DBMS by using data dependency relationships, i.e., data items which must be read or written before a data item is updated and others which must be written after the update.…”
Section: Related Work Discussionmentioning
confidence: 99%
“…Indeed, we consider the retroactively updated datum and all data depending on it (extracted from the transaction log) as inconsistent data. Besides, Pavlou and Snodgrass (2013) have proposed an approach for: 1 detecting falsifications in the database 2 generalising forensic analysis of these falsifications to prevent them from silently corrupting the database log.…”
Section: Related Work Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…Examples of these methods are table-relationship analysis [8] and data file carving [9]. However, these methods either lack formalisation and scientific background [10], or may not be suitable for investigating databases [11]. As a consequence, ad hoc database investigations over rely on the practitioner's knowledge and expertise, leading to conjectures about insider behaviour since the only available evidence to fully explain such actions may be partially recovered or unavailable.…”
Section: Introductionmentioning
confidence: 99%