Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Forensic Recovery of SQL Server Database: Practical Approach

Authors
Choi, HoyongLee, SangjinJeong, Doowon
Issue Date
2021
Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
Keywords
Databases; Forensics; Engines; Tools; Digital forensics; Servers; Metadata; Database; forensics; SQL server; MSSQL; servers
Citation
IEEE ACCESS, v.9, pp.14564 - 14575
Indexed
SCIE
SCOPUS
Journal Title
IEEE ACCESS
Volume
9
Start Page
14564
End Page
14575
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/50669
DOI
10.1109/ACCESS.2021.3052505
ISSN
2169-3536
Abstract
Database forensics is becoming more important for investigators with the increased use of the information system. Although various database forensic methods such as log analysis and investigation model development have been studied, among the database forensic methods, recovering deleted data is a key technique in database investigation for DB tampering and anti-forensics. Previous studies mainly focused on transaction or journal log to recover deleted data, but if logs are set to be deleted periodically or logs containing critical evidence are overwritten by new logs, the log-based recovery method can not be used practically. For this reason, an engine-based recovery method that analyzes data file at a raw level has been also introduced. There is research to recover small-sized databases such as SQLite and EDB, but there is no prior work describing the structure of data file and technology to recover deleted data of large databases used by enterprises or large organizations. In this context, we investigate Microsoft SQL Server (MSSQL), which is one of the most used large databases. Our method focuses on a storage engine of MSSQL. Through analyzing the storage engine, we identify the internal structure of MSSQL data files and the storage mechanism. Based on these findings, a method to recover tables and records is presented by empirical examination. It is compatible with various versions of MSSQL because it accesses data at the raw level. Our proposed method is verified by a comparative experiment with forensic tools implemented to recover deleted MSSQL data. The experimental results show that our method recovers all deleted records from the unallocated area. It recovers all data types including multimedia data, called Large Objects (LOB) in the database field. To contribute digital forensic community, we also provide the source code of the implementation; it facilitates the knowledge sharing of database forensics.
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher LEE, SANG JIN photo

LEE, SANG JIN
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE