DocumentCode
3776534
Title
Digital forensic techniques for finding the hidden database using analytical strategies
Author
Dhiraj D. Shirbhate;S. R. Gupta
Author_Institution
Dept of C.S.E J.D.I.E.T, Yavatmal-445001, Maharashtra, India
fYear
2015
Firstpage
21
Lastpage
26
Abstract
Now a day´s digital forensic investigators are looking into the suspicious organizations and companies for detecting various frauds. It is very important to have a data which has the overall information of data of the company. As we know that the structure of company´s database is very complicated it is very difficult for the investigator to investigate in the particular company if he or she doesn´t know anything about the company´s database. Many companies built a covert database for various purposes. First is to keep their marketing process secret and other is to hide their financial transactions which can also be called as the fraud transactions. So in this paper we will describe the overall structure of covert database and covert channel and will propose the various techniques for detecting the covert database system. We will also describe an algorithm for finding the covert channel. Also we will suggest scenarios about investigation by using our tool which we used for the investigation purpose.
Keywords
"Servers","Companies","Database systems","Digital forensics","Security"
Publisher
ieee
Conference_Titel
Information Processing (ICIP), 2015 International Conference on
Type
conf
DOI
10.1109/INFOP.2015.7489344
Filename
7489344
Link To Document