130 likes | 390 Views
Forensic Analysis of Database Tampering. Raul Quinonez CS 4398 Digital Forensics 10/25/13. Introduction. How to detect tampering? What data has been tampered? Who did it via forensic analysis?. Tamper Detection. Cryptographic Hashing functions Normal Processing Phase
E N D
Forensic Analysis of Database Tampering Raul Quinonez CS 4398 Digital Forensics 10/25/13
Introduction • How to detect tampering? • What data has been tampered? • Who did it via forensic analysis?
Tamper Detection Cryptographic Hashing functions Normal Processing Phase Digital Normalization Service
Temporal Detection • Each transaction is hashed • Identify corrupted stored data transactions • Focus on original time of transaction and time of corrupted transaction • Several corrupted tuples- Multi-locus • Single corrupted tuple- Single-locus
Forensic Analysis • Monochromatic • Cumulative hash chains (black) • RGBY • Three types of chains (Red, green, blue) • Tiled Bitmap • Tiles of chains over continous data segments • a3D Algorithm • Partial hash chanis changes with transaction time
Forensic Algorithm Comparison • Tiled bitmap is the cheapest • Monochromatic is the easiest to implement • RGBY is the best option for larger corruption cases • a3D Algorithm has a constant cost
Conclusion • How, what and who? • Forensic Algorithms • Comparison of algorithms
References • Kyri Pavlou and Richard T. Snodgrass, "Forensic Analysis of Database Tampering," in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pages 109-120, Chicago, June, 2006.