Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

NOVEL METHODOLOGIES TO DETECT COVERT DATABASES

Authors
Lee, Keun GiChoi, Joon HoLim, Kyung SooLee, SeokheeLee, Sangjin
Issue Date
Mar-2010
Publisher
ICIC INT
Keywords
Digital forensic; Database; Hiding; Network searching
Citation
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, v.6, no.3B, pp.1313 - 1324
Indexed
SCIE
SCOPUS
Journal Title
INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL
Volume
6
Number
3B
Start Page
1313
End Page
1324
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/116887
ISSN
1349-4198
Abstract
Companies have substituted paper based systems with IT systems, such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system We should focus or attention on discovering sensitive information in a database server, since the majority of corporations use DBMS However, concealment is difficult to observe and detect, because perpetrators do their best to hide their illegal activities In particular, we need to consider the case of a cover database server This paper proposes methodologies to detect covert database servers that would be helpful to forensic investigators Therefore, we describe an example of a covert database server and suggest several detection techniques. Finally, we provide an investigation scenario that applied our methodology in the real world.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE