Carving database storage to detect and trace security breaches

Digital Investigation - Tập 22 - Trang S127-S136 - 2017
James Wagner1, Alexander Rasin, Boris Glavic2, Karen Heart1, Jacob Furst1, Lucas Bressan1, Jonathan Grier3
1DePaul University, Chicago, IL, USA
2Illinois Institute of Technology, Chicago, IL, USA
3Grier Forensics, USA

Tài liệu tham khảo

A. Act, 1996, Health insurance portability and accountability act of 1996, Public Law, 104, 191 Crosby, 2009, Efficient data structures for tamper-evident logging, 317 Eventlog analyzer, https://www.manageengine.com/products/eventlog/. Fabbri, 2013, Select triggers for data auditing, 1141 Garfinkel, 2007, Carving contiguous and fragmented files with fast object validation, Digit. Investig., 4, 2, 10.1016/j.diin.2007.06.017 Ibm Security Guardium Express Activity Monitor for Databases, http://www-03.ibm.com/software/products/en/ibm-security-guardium-express-activity-monitor-for-databases (2017) . Kohler, W., Shah, A., Raab, F. Overview of Tpc Benchmark c: The Order-Entry benchmark. Transaction Processing Performance Council, Technical Report. Liu, 2009, A framework for database auditing, 982 Mercuri, 2003, On auditing audit trails, Commun. ACM, 46, 17, 10.1145/602421.602436 O'Neil, 2009, The star schema benchmark and augmented fact table indexing, 237 OfficeRecovery, Recovery for mysql, http://www.officerecovery.com/mysql/. Pavlou, 2008, Forensic analysis of database tampering, ACM Trans. Database Syst. (TODS), 33, 30, 10.1145/1412331.1412342 Peha, 1999, Electronic commerce with verifiable audit trails Percona, Percona data recovery tool for innodb, https://launchpad.net/percona-data-recovery-tool-for-innodb. Phoenix, S. Db2 recovery software, http://www.stellarinfo.com/database-recovery/db2-recovery.php. Raab, 1995 Richard, 2005, Scalpel: a frugal, high performance file carver S.-O. Act, Sarbanes-oxley Act, Washington DC. Schneier, 1999, Secure audit logs to support computer forensics, ACM Trans. Inf. Syst. Secur. (TISSEC), 2, 159, 10.1145/317087.317089 Sinha, 2014, Continuous tamper-proof logging using tpm 2.0, 19 Snodgrass, 2004, Tamper detection in audit logs, 504 Wagner, 2015, Database forensic analysis through internal structure carving, Digit. Investig., 14, S106, 10.1016/j.diin.2015.05.013 Wagner, 2016, Database image content explorer: carving data that does not officially exist, Digit. Investig., 18, S97, 10.1016/j.diin.2016.04.015 Wagner, 2017, Database forensic analysis with DBCarver