Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

The effective method of database server forensics on the enterprise environment

Full metadata record
DC Field Value Language
dc.contributor.authorSon, Namheun-
dc.contributor.authorLee, Keungi-
dc.contributor.authorJeon, SangJun-
dc.contributor.authorLee, Sangjin-
dc.contributor.authorLee, Changhoon-
dc.date.accessioned2021-09-06T15:13:14Z-
dc.date.available2021-09-06T15:13:14Z-
dc.date.created2021-06-15-
dc.date.issued2012-10-
dc.identifier.issn1939-0114-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/107412-
dc.description.abstractWhen a forensic investigation is carried out in the enterprise environment, most of the important data are stored in database servers, and data stored in them are very important elements for a forensic investigation. As for database servers with such data stored, there are over 10 various kinds, such as SQL Server and Oracle. All the methods of investigating a database system are important, but this study suggests a single methodology likely to investigate all the database systems while considering the unique characteristics of each database system. A method of detecting a server and acquiring and investigating data in the server can be effectively used for such an investigation on the enterprise environment. For the existing investigation on server systems, severs should be shut down, and disc imaging should be conducted first. However, such a method may inflict great losses on the company in some cases. That is why we need a method to acquire data of a server in on-line state, and this study discusses this method. Besides, on the basis of methodology, this study attempts to determine a possibility that this new forensic investigation method can be practically used by directly applying this method to SQL Server and MySQL databases. Copyright (c) 2012 John Wiley & Sons, Ltd.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherWILEY-HINDAWI-
dc.titleThe effective method of database server forensics on the enterprise environment-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.identifier.doi10.1002/sec.510-
dc.identifier.scopusid2-s2.0-84867616572-
dc.identifier.wosid000309238700002-
dc.identifier.bibliographicCitationSECURITY AND COMMUNICATION NETWORKS, v.5, no.10, pp.1086 - 1093-
dc.relation.isPartOfSECURITY AND COMMUNICATION NETWORKS-
dc.citation.titleSECURITY AND COMMUNICATION NETWORKS-
dc.citation.volume5-
dc.citation.number10-
dc.citation.startPage1086-
dc.citation.endPage1093-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordAuthorforensic-
dc.subject.keywordAuthorenterprise-
dc.subject.keywordAuthordatabase server-
dc.subject.keywordAuthornetwork topology-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
정보보호학과
Read more

Altmetrics

Total Views & Downloads

BROWSE