NOVEL METHODOLOGIES TO DETECT COVERT DATABASES
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Keun Gi | - |
dc.contributor.author | Choi, Joon Ho | - |
dc.contributor.author | Lim, Kyung Soo | - |
dc.contributor.author | Lee, Seokhee | - |
dc.contributor.author | Lee, Sangjin | - |
dc.date.accessioned | 2021-09-08T04:48:07Z | - |
dc.date.available | 2021-09-08T04:48:07Z | - |
dc.date.issued | 2010-03 | - |
dc.identifier.issn | 1349-4198 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/116887 | - |
dc.description.abstract | Companies have substituted paper based systems with IT systems, such as DBMS (Database Management System), EDMS (Electronic Document Management System), and ERP (Enterprise Resource Planning) system We should focus or attention on discovering sensitive information in a database server, since the majority of corporations use DBMS However, concealment is difficult to observe and detect, because perpetrators do their best to hide their illegal activities In particular, we need to consider the case of a cover database server This paper proposes methodologies to detect covert database servers that would be helpful to forensic investigators Therefore, we describe an example of a covert database server and suggest several detection techniques. Finally, we provide an investigation scenario that applied our methodology in the real world. | - |
dc.format.extent | 12 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | ICIC INT | - |
dc.title | NOVEL METHODOLOGIES TO DETECT COVERT DATABASES | - |
dc.type | Article | - |
dc.publisher.location | 일본 | - |
dc.identifier.wosid | 000275768200011 | - |
dc.identifier.bibliographicCitation | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, v.6, no.3B, pp 1313 - 1324 | - |
dc.citation.title | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL | - |
dc.citation.volume | 6 | - |
dc.citation.number | 3B | - |
dc.citation.startPage | 1313 | - |
dc.citation.endPage | 1324 | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordAuthor | Digital forensic | - |
dc.subject.keywordAuthor | Database | - |
dc.subject.keywordAuthor | Hiding | - |
dc.subject.keywordAuthor | Network searching | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
145 Anam-ro, Seongbuk-gu, Seoul, 02841, Korea+82-2-3290-2963
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.