Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

NOVEL METHODOLOGIES TO DETECT COVERT DATABASES

Full metadata record
DC Field Value Language
dc.contributor.authorLee, Keun Gi-
dc.contributor.authorChoi, Joon Ho-
dc.contributor.authorLim, Kyung Soo-
dc.contributor.authorLee, Seokhee-
dc.contributor.authorLee, Sangjin-
dc.date.accessioned2021-09-08T04:48:07Z-
dc.date.available2021-09-08T04:48:07Z-
dc.date.created2021-06-11-
dc.date.issued2010-03-
dc.identifier.issn1349-4198-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/116887-
dc.description.abstractCompanies have substituted paper based systems with IT systems, such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system We should focus or attention on discovering sensitive information in a database server, since the majority of corporations use DBMS However, concealment is difficult to observe and detect, because perpetrators do their best to hide their illegal activities In particular, we need to consider the case of a cover database server This paper proposes methodologies to detect covert database servers that would be helpful to forensic investigators Therefore, we describe an example of a covert database server and suggest several detection techniques. Finally, we provide an investigation scenario that applied our methodology in the real world.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherICIC INT-
dc.titleNOVEL METHODOLOGIES TO DETECT COVERT DATABASES-
dc.typeArticle-
dc.contributor.affiliatedAuthorLee, Sangjin-
dc.identifier.wosid000275768200011-
dc.identifier.bibliographicCitationINTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, v.6, no.3B, pp.1313 - 1324-
dc.relation.isPartOfINTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL-
dc.citation.titleINTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL-
dc.citation.volume6-
dc.citation.number3B-
dc.citation.startPage1313-
dc.citation.endPage1324-
dc.type.rimsART-
dc.type.docTypeArticle; Proceedings Paper-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalWebOfScienceCategoryComputer Science, Artificial Intelligence-
dc.subject.keywordAuthorDigital forensic-
dc.subject.keywordAuthorDatabase-
dc.subject.keywordAuthorHiding-
dc.subject.keywordAuthorNetwork searching-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE