Downloads: 100 | Views: 106
M.Tech / M.E / PhD Thesis | Software Engineering | India | Volume 5 Issue 5, May 2016
Detecting Forgery in Trigger Based Database Transaction
Bhagyalakshmi S | Maniveena C [3]
Abstract: Nowadays, traditional digital investigations often excluded databases even though evidence can usually be found in them. Although the field is still in its early years, it is quickly becoming an important part of many investigations due to the increased volume of information, that may be helpful in solving different crimes and the greater risks associated with the data stored on many databases. Of major importance in database, forensics is the ability to retrace the operations performed on a database and reconstruct deleted or compromised information on the database. This requirement affects the data collection and analysis process during the forensics analysis of a database. An aspect of database forensics that has not received much awareness in the academic research community yet is the presence of database triggers. Database triggers and their implementations have not yet been thoroughly analysed to establish what possible impact they could have on digital forensic analysis methods and processes. Conventional database triggers are defined to execute automatic actions based on changes in the database. This paper attempts to develop an application, which can interface with MySQL database, helps to detect the SQL injection hijacking and reverse the actions of the intruder. This helps to protect the credibility of an organization.
Keywords: SQL Trigger, Database SQL Injection Attacks, Database watcher, File log, Trigger Schema Table
Edition: Volume 5 Issue 5, May 2016,
Pages: 1444 - 1446
Similar Articles with Keyword 'Database'
Downloads: 103
M.Tech / M.E / PhD Thesis, Software Engineering, India, Volume 4 Issue 3, March 2015
Pages: 1344 - 1346Efficient Query Analyzer with Personalized Recommendations
Sini R [3] | Lizmol Stephen [2]
Downloads: 119
Research Paper, Software Engineering, India, Volume 4 Issue 7, July 2015
Pages: 724 - 726Monitoring Software Project Health Using Visual Analysis
Padmakar G. Selokar | Bharathi Shetty