• DocumentCode
    3776534
  • Title

    Digital forensic techniques for finding the hidden database using analytical strategies

  • Author

    Dhiraj D. Shirbhate;S. R. Gupta

  • Author_Institution
    Dept of C.S.E J.D.I.E.T, Yavatmal-445001, Maharashtra, India
  • fYear
    2015
  • Firstpage
    21
  • Lastpage
    26
  • Abstract
    Now a day´s digital forensic investigators are looking into the suspicious organizations and companies for detecting various frauds. It is very important to have a data which has the overall information of data of the company. As we know that the structure of company´s database is very complicated it is very difficult for the investigator to investigate in the particular company if he or she doesn´t know anything about the company´s database. Many companies built a covert database for various purposes. First is to keep their marketing process secret and other is to hide their financial transactions which can also be called as the fraud transactions. So in this paper we will describe the overall structure of covert database and covert channel and will propose the various techniques for detecting the covert database system. We will also describe an algorithm for finding the covert channel. Also we will suggest scenarios about investigation by using our tool which we used for the investigation purpose.
  • Keywords
    "Servers","Companies","Database systems","Digital forensics","Security"
  • Publisher
    ieee
  • Conference_Titel
    Information Processing (ICIP), 2015 International Conference on
  • Type

    conf

  • DOI
    10.1109/INFOP.2015.7489344
  • Filename
    7489344