Title
Carving database storage to detect and trace security breaches
Abstract
Database Management Systems (DBMS) are routinely used to store and process sensitive enterprise data. However, it is not possible to secure data by relying on the access control and security mechanisms (e.g., audit logs) of such systems alone – users may abuse their privileges (no matter whether granted or gained illegally) or circumvent security mechanisms to maliciously alter and access data. Thus, in addition to taking preventive measures, the major goal of database security is to 1) detect breaches and 2) to gather evidence about attacks for devising counter measures. We present an approach that evaluates the integrity of a live database, identifying and reporting evidence for log tampering. Our approach is based on forensic analysis of database storage and detection of inconsistencies between database logs and physical storage state (disk and RAM). We apply our approach to multiple DBMS to demonstrate its effectiveness in discovering malicious operations and providing detailed information about the data that was illegally accessed/modified.
Year
DOI
Venue
2017
10.1016/j.diin.2017.06.006
Digital Investigation
Keywords
DocType
Volume
Database forensics,File carving,Memory analysis
Journal
22
Issue
ISSN
Citations 
SUPnan
1742-2876
4
PageRank 
References 
Authors
0.65
9
7
Name
Order
Citations
PageRank
James Wagner1165.56
Alexander Rasin22950209.48
Boris Glavic328436.70
Karen Heart440.99
Jacob D. Furst554556.63
Lucas Bressan640.65
Jonathan Grier7305.36