Carving database storage to detect and trace security breaches
Tài liệu tham khảo
A. Act, 1996, Health insurance portability and accountability act of 1996, Public Law, 104, 191
Crosby, 2009, Efficient data structures for tamper-evident logging, 317
Eventlog analyzer, https://www.manageengine.com/products/eventlog/.
Fabbri, 2013, Select triggers for data auditing, 1141
Garfinkel, 2007, Carving contiguous and fragmented files with fast object validation, Digit. Investig., 4, 2, 10.1016/j.diin.2007.06.017
Ibm Security Guardium Express Activity Monitor for Databases, http://www-03.ibm.com/software/products/en/ibm-security-guardium-express-activity-monitor-for-databases (2017) .
Kohler, W., Shah, A., Raab, F. Overview of Tpc Benchmark c: The Order-Entry benchmark. Transaction Processing Performance Council, Technical Report.
Liu, 2009, A framework for database auditing, 982
Mercuri, 2003, On auditing audit trails, Commun. ACM, 46, 17, 10.1145/602421.602436
O'Neil, 2009, The star schema benchmark and augmented fact table indexing, 237
OfficeRecovery, Recovery for mysql, http://www.officerecovery.com/mysql/.
Pavlou, 2008, Forensic analysis of database tampering, ACM Trans. Database Syst. (TODS), 33, 30, 10.1145/1412331.1412342
Peha, 1999, Electronic commerce with verifiable audit trails
Percona, Percona data recovery tool for innodb, https://launchpad.net/percona-data-recovery-tool-for-innodb.
Phoenix, S. Db2 recovery software, http://www.stellarinfo.com/database-recovery/db2-recovery.php.
Raab, 1995
Richard, 2005, Scalpel: a frugal, high performance file carver
S.-O. Act, Sarbanes-oxley Act, Washington DC.
Schneier, 1999, Secure audit logs to support computer forensics, ACM Trans. Inf. Syst. Secur. (TISSEC), 2, 159, 10.1145/317087.317089
Sinha, 2014, Continuous tamper-proof logging using tpm 2.0, 19
Snodgrass, 2004, Tamper detection in audit logs, 504
Wagner, 2015, Database forensic analysis through internal structure carving, Digit. Investig., 14, S106, 10.1016/j.diin.2015.05.013
Wagner, 2016, Database image content explorer: carving data that does not officially exist, Digit. Investig., 18, S97, 10.1016/j.diin.2016.04.015
Wagner, 2017, Database forensic analysis with DBCarver