Please use this identifier to cite or link to this item: https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/1784
Title: Database Forensics: Database Tamper Detection and Prevention
Authors: Karunarathna, K.P.A.S.
Issue Date:  12
Abstract: Audit logs are considered as a good practice for systems which contains sensitive data. Federal regulations are forced to maintain audit logs for secure systems such as financial applications, data for approval of drugs, military records, and even for electronic voting. It is critical that audit logs are correct and inalterable. Just by maintaining an audit log does not reflect 100% integrity. The problem with the audit logs is that insiders such as Database Administrator (DBA) or internal auditors who have full access to the database can tamper the database and alter the audit records to remain undetected. This research proposes a mechanism that runs on top of the Database Management Systems (DBMS) layer to prevent the intruders both inside and outside, from tampering the database. There are two main components, the security layer which is based on strong one-way hash functions to prevent the tampering events, and a validation program to detect whether any tampering event has been occurred. The security mechanism collects evidences of the transactions performed on the database and the validation program analyses those evidence to identify whether the database has been tampered. If a database tampering has been occurred the proposed mechanism will identify when the tampering has occurred, what records have been tampered and eventually if there is enough evidence the system will find out who the attacker is.
URI: http://hdl.handle.net/123456789/1784
Appears in Collections:SCS Individual Project - Final Thesis (2012)

Files in This Item:
File Description SizeFormat 
16.pdf
  Restricted Access
2.03 MBAdobe PDFView/Open Request a copy


Items in UCSC Digital Library are protected by copyright, with all rights reserved, unless otherwise indicated.