ISSN

2231-3915 (Online)
2231-3907 (Print)


Author(s): Manish Bhagwani, Arpana Rawal, Jyoti Singh

Email(s): manishbhagwani11@gmail.com , arpana.rawal@gmail.com , jsraipur13@gmail.com

DOI: 10.5958/2231-3915.2020.00019.X   

Address: Manish Bhagwani1, Dr. Arpana Rawal2, Dr. Jyoti Singh3
1Research Scholar, Bhilai Institute of Technology, Durg (CG), India.
2Professor, Bhilai Institute of Technology, Durg (CG), India.
3Joint Controller, CGVYAPAM, Raipur (CG), India.
*Corresponding Author

Published In:   Volume - 10,      Issue - 1,     Year - 2020


ABSTRACT:
Majority of database breaches that include temporary data tampering, data copying, changing time stamps in log files, tampering data in database, done by intruders in various enterprise databases; both Government and commercial, have made it essential to apply diagnostic methods like auditing tools to identify the type, place and time of data corruption. These tools offer a lot of features that can provide data useful for database investigation. Moreover, auditing techniques can be applied to these databases to enable database forensic investigator to do the analysis and find the answers as to WHERE, WHEN and WHO corrupted the data. This kind of analyses has been done by various algorithms (Trivial, Monochromatic, RGB, Polychromatic, RGBY, Tiled Bitmap, a3D). These algorithms fail to detect temporary data corruption and un-authorized copying of data. This paper focuses on the study and analysis of techniques for making transaction logs, tracking the user activities and detecting transactions that copy data from tables, specially using SELECT operations.


Cite this article:
Manish Bhagwani, Arpana Rawal, Jyoti Singh. Implementing Auditing Techniques in Enterprise Databases. Int. J. Tech. 2020; 10(1):97-101. doi: 10.5958/2231-3915.2020.00019.X


REFERENCE:
1.    The SQL Server“AUDIT (Traditional Auditing)”, https://docs. oracle.com/database/121/SQLRF/statements_4007.htm#S QLRF01107
2.    “MySQL Enterprise Audit”, https://dev.mysql. com/doc/refman/8.0/en/audit-log.html
3.    “Audit Trail in Access Forms in 6 Steps”, https://blueclawdatabase.com/access-forms-audit-trail“SQL Server Audit”, https://docs.microsoft.com /en- us/sql/relational-databases/security/auditing/sql-server- audit-database-engine?view=sql-server-ver15
4.    “SQLite Triggers”, https://www.w3resource.com /sqlite/sqlite-triggers.php
5.    Kyriacos Pavlou, Richard T. Snodgress, “Forensic Analysis of Database Tampering,” SIGMOD’06, pp: 109- 120, June 27-29, 2006.
6.    Kyriacos Pavlou, Richard T. Snodgress, “Generalizing Database Forensics,” ACM Transaction on Database Forensics, pp. 1-60, June 2013.
7.    David Litchfield, “Oracle forensics part 7 Using the oracle system change number in forensic investigations,” An NGSSoftware Insight Security Research (NISR) Publication, November 2008.
8.    “Auditing SELECT statements on SQL Server”, https://solutioncenter.apexsql.com/auditing-select- statements-on-sql-server/
9.    “SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur”, https://www. stigviewer.com/stig/ms_sql_server_2014_instance/2018- 09-18/finding/V-67923
10.    Wagner J. at el. (2017), “Carving database storage to detect and trace security breaches,” Digital Investigation (Elsevier), Issue 22, pp. 127-136.

Recomonded Articles:

Author(s): G. C. Rana, Ramesh Chand, S. K. Kango

DOI: 10.5958/2231-3915.2016.00011.0         Access: Open Access Read More

Author(s): Madu Anthony Joseph Chinenyeze, Otuokere Ifeanyi Edozie

DOI: 10.5958/2231-3915.2017.00001.3         Access: Open Access Read More

Author(s): Pallavi Kale, Mohini T. Bherwani

DOI: 10.5958/2231-3915.2017.00010.4         Access: Open Access Read More

Author(s): Pavankumar Naik, Rajeshwari Gamanagatti, Jagadeesh Meti, Nagaraj Telkar

DOI: 10.5958/2231-3915.2017.00011.6         Access: Open Access Read More

Author(s): Satish Kumar Chandel

DOI: 10.5958/2231-3915.2016.00022.5         Access: Open Access Read More

Author(s): Jyoti Prakash, Pankaj Kumar, Shweta Manan

DOI: 10.5958/2231-3915.2016.00015.8         Access: Open Access Read More

Author(s): Amit Kumar, Rahul Dutta, Harbhajan Rai, Rushali Patil

DOI: 10.5958/2231-3915.2017.00006.2         Access: Open Access Read More

Author(s): Parth R. Shah, Pratik J. Gupta, Rushant S. Sabnis

DOI: 10.5958/2231-3915.2017.00012.8         Access: Open Access Read More

Author(s): Rakesh Sharma

DOI: 10.5958/2231-3915.2016.00026.2         Access: Open Access Read More

Author(s): Ankit Vyas, S.K. Satpathy

DOI:         Access: Open Access Read More

Author(s): Veena Sharma, Abhilasha, Urvashi Gupta

DOI: 10.5958/2231-3915.2016.00040.7         Access: Open Access Read More

Author(s): P.K. Singh, Narendra Pal Singh

DOI:         Access: Open Access Read More

Author(s): Badri Narayan Mohapatra, Joel Dsouza, Yash Sangoiy, Nisarg Shah

DOI: 10.5958/2231-3915.2018.00001.9         Access: Closed Access Read More

Author(s): Abhijit Ray

DOI:         Access: Open Access Read More

Author(s): Astha Sharma, S.P. Dubey

DOI:         Access: Open Access Read More

Author(s): Anita Bara, Anurag Shrivastava

DOI:         Access: Open Access Read More

Author(s): Sweta Kumari, Varsha Singh

DOI:         Access: Open Access Read More

International Journal of Technology (IJT) is an international, peer-reviewed journal, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology...... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2231-3915 


Recent Articles




Tags