ISSN

2231-3915 (Online)
2231-3907 (Print)


Author(s): Manish Bhagwani, Arpana Rawal, Jyoti Singh

Email(s): manishbhagwani11@gmail.com , arpana.rawal@gmail.com , jsraipur13@gmail.com

DOI: 10.5958/2231-3915.2020.00019.X   

Address: Manish Bhagwani1, Dr. Arpana Rawal2, Dr. Jyoti Singh3
1Research Scholar, Bhilai Institute of Technology, Durg (CG), India.
2Professor, Bhilai Institute of Technology, Durg (CG), India.
3Joint Controller, CGVYAPAM, Raipur (CG), India.
*Corresponding Author

Published In:   Volume - 10,      Issue - 1,     Year - 2020


ABSTRACT:
Majority of database breaches that include temporary data tampering, data copying, changing time stamps in log files, tampering data in database, done by intruders in various enterprise databases; both Government and commercial, have made it essential to apply diagnostic methods like auditing tools to identify the type, place and time of data corruption. These tools offer a lot of features that can provide data useful for database investigation. Moreover, auditing techniques can be applied to these databases to enable database forensic investigator to do the analysis and find the answers as to WHERE, WHEN and WHO corrupted the data. This kind of analyses has been done by various algorithms (Trivial, Monochromatic, RGB, Polychromatic, RGBY, Tiled Bitmap, a3D). These algorithms fail to detect temporary data corruption and un-authorized copying of data. This paper focuses on the study and analysis of techniques for making transaction logs, tracking the user activities and detecting transactions that copy data from tables, specially using SELECT operations.


Cite this article:
Manish Bhagwani, Arpana Rawal, Jyoti Singh. Implementing Auditing Techniques in Enterprise Databases. Int. J. Tech. 2020; 10(1):97-101. doi: 10.5958/2231-3915.2020.00019.X

Cite(Electronic):
Manish Bhagwani, Arpana Rawal, Jyoti Singh. Implementing Auditing Techniques in Enterprise Databases. Int. J. Tech. 2020; 10(1):97-101. doi: 10.5958/2231-3915.2020.00019.X   Available on: https://ijtonline.com/AbstractView.aspx?PID=2020-10-1-19


REFERENCE:
1.    The SQL Server“AUDIT (Traditional Auditing)”, https://docs. oracle.com/database/121/SQLRF/statements_4007.htm#S QLRF01107
2.    “MySQL Enterprise Audit”, https://dev.mysql. com/doc/refman/8.0/en/audit-log.html
3.    “Audit Trail in Access Forms in 6 Steps”, https://blueclawdatabase.com/access-forms-audit-trail“SQL Server Audit”, https://docs.microsoft.com /en- us/sql/relational-databases/security/auditing/sql-server- audit-database-engine?view=sql-server-ver15
4.    “SQLite Triggers”, https://www.w3resource.com /sqlite/sqlite-triggers.php
5.    Kyriacos Pavlou, Richard T. Snodgress, “Forensic Analysis of Database Tampering,” SIGMOD’06, pp: 109- 120, June 27-29, 2006.
6.    Kyriacos Pavlou, Richard T. Snodgress, “Generalizing Database Forensics,” ACM Transaction on Database Forensics, pp. 1-60, June 2013.
7.    David Litchfield, “Oracle forensics part 7 Using the oracle system change number in forensic investigations,” An NGSSoftware Insight Security Research (NISR) Publication, November 2008.
8.    “Auditing SELECT statements on SQL Server”, https://solutioncenter.apexsql.com/auditing-select- statements-on-sql-server/
9.    “SQL Server must generate Trace or Audit records when unsuccessful attempts to add privileges/permissions occur”, https://www. stigviewer.com/stig/ms_sql_server_2014_instance/2018- 09-18/finding/V-67923
10.    Wagner J. at el. (2017), “Carving database storage to detect and trace security breaches,” Digital Investigation (Elsevier), Issue 22, pp. 127-136.

Recomonded Articles:

Author(s): Bhavana Narain, Ankit Kumar

DOI: 10.5958/2231-3915.2020.00012.7         Access: Open Access Read More

Author(s): Pallavi Kale, Mohini T. Bherwani

DOI: 10.5958/2231-3915.2017.00010.4         Access: Open Access Read More

Author(s): Prashant Kumar Gavel, Ramakant Prasad, Nainsy Rathore, Deepshikha Yadav

DOI: 10.5958/2231-3915.2020.00016.4         Access: Open Access Read More

Author(s): Pavankumar Naik, Rajeshwari Gamanagatti, Jagadeesh Meti, Nagaraj Telkar

DOI: 10.5958/2231-3915.2017.00011.6         Access: Open Access Read More

Author(s): Abdul-Rahaman Mohammed, Zuyelle Solomon, Dassah M. Nurideen

DOI: 10.52711/2231-3915.2021.00005         Access: Open Access Read More

Author(s): Madu Anthony Joseph Chinenyeze, Otuokere Ifeanyi Edozie

DOI: 10.5958/2231-3915.2017.00001.3         Access: Open Access Read More

Author(s): G. C. Rana, Ramesh Chand, S. K. Kango

DOI: 10.5958/2231-3915.2016.00011.0         Access: Open Access Read More

Author(s): Asubonteng Mishack, James Kwabena Essiaw, Alhassan Abdul Razak, Bridgitte Owusu-Boadu

DOI: 10.52711/2231-3915.2021.00004         Access: Open Access Read More

Author(s): Kirti Sahu, Srishti Chandrakar, Rubi Kambo

DOI: 10.5958/2231-3915.2020.00010.3         Access: Open Access Read More

Author(s): Vijayant Verma, Anil Kumar Tiwari

DOI: 10.5958/2231-3915.2020.00017.6         Access: Open Access Read More

Author(s): Amane Nikita B., Shete Sanmati D, Chavan Rajeshwar V., Desai Punam S., V. R. Salunkhe

DOI: 10.5958/2231-3915.2019.00012.9         Access: Open Access Read More

Author(s): Abhijit Ray

DOI:         Access: Open Access Read More

Author(s): Rajeshri Lanjewar, Tripti Sharma

DOI:         Access: Open Access Read More

Author(s): Amit Kumar, Rahul Dutta, Harbhajan Rai, Rushali Patil

DOI: 10.5958/2231-3915.2017.00006.2         Access: Open Access Read More

Author(s): Muhammad Adnan Younis, Iftikhar Hussain Bukhari, Qaisar Abbas, Neelam Bin Talib, Sana Shaukat

DOI: 10.5958/2231-3915.2018.00008.1         Access: Open Access Read More

Author(s): Deepti Verma, Gitanjali Sinha

DOI:         Access: Open Access Read More

Author(s): Manoj Kumar Chande, Rajlaxmi Gupta, Shailesh Dhar Diwan

DOI: 10.5958/2231-3915.2020.00018.8         Access: Open Access Read More

International Journal of Technology (IJT) is an international, peer-reviewed journal, research journal aiming at promoting and publishing original high quality research in all disciplines of engineering sciences and technology...... Read more >>>

RNI: Not Available                     
DOI: 10.5958/2231-3915 


Recent Articles




Tags