Graphically Display Database Transactions to Enhance Database Forensics

Author(s):  
Christine Orosco ◽  
Cihan Varol ◽  
Narasimha Shashidhar
2013 ◽  
Vol 7 (3) ◽  
pp. 654-663 ◽  
Author(s):  
Harmeet Kaur Khanuja ◽  
Dr. D.S. Adane

The information security for securing enterprise databases from internal and external attacks and violations of mutual policy is an interminable struggle. With the growing number of attacks and frauds, the organizations are finding it difficult to meet various regulatory compliance requirements such as SOX, HIPAA, and state privacy laws. The aim here is to develop a methodology which monitors the database transactions on continuous basis and to make a decision whether the database transactions are legitimate or suspicious by combining multiple evidences gathered. The suspicious transactions can then be used for forensic analysis to reconstruct the illegal activity carried out in an organization. This can be achieved by incorporating information accountability in Database Management System. Information accountability means, the information usage should be transparent so that it is possible to determine whether a use is appropriate under a given set of rules. We focus on effective information accountability of data stored in high-performance databases through database forensics which collects and analyses database transactions collected through various sources and artifacts like data cache, log files, error logs etc. having volatile or non-volatile characteristics within high performance databases. The information and multiple evidences collected are then analyzed using an Extended Dempster-Shafer theory(EDST). It  combines multiple such evidences and an initial belief is computed for suspected transactions which can be further used for reconstructing the activity in database forensics process.


2019 ◽  
Vol 7 (3) ◽  
pp. 23-26
Author(s):  
Nibedita Chakraborty ◽  
Krishna Punwar
Keyword(s):  

Author(s):  
Chellammal Surianarayanan ◽  
Gopinath Ganapathy ◽  
Pethuru Raj

In this chapter, we first revisit the basic concepts of database transactions, and discuss how these concepts are achieved in practical systems. Next, we briefly go through the architecture of transaction processing systems in the centralized and the distributed environments. This chapter we have reviewed the basic concepts of database systems and database transactions, and discussed the architecture of transaction processing systems in distributed environments. We will shift our focus to transactions and transaction processing in mobile environments, which possess some unique characteristics such as the mobility of mobile computing hosts, the limitations of wireless communications and the resource constraints of mobile computing devices.


Sign in / Sign up

Export Citation Format

Share Document