Discovering methodology and scenario to detect covert database system

Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.

Original languageEnglish
Title of host publicationProceedings of Future Generation Communication and Networking, FGCN 2007
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages130-135
Number of pages6
ISBN (Print)0769530486, 9780769530482
DOIs
Publication statusPublished - 2007
Event2007 International Conference on Future Generation Communication and Networking, FGCN 2007 - Jeju Island, Korea, Republic of
Duration: 2007 Dec 62007 Dec 8

Publication series

NameProceedings of Future Generation Communication and Networking, FGCN 2007
Volume2

Other

Other2007 International Conference on Future Generation Communication and Networking, FGCN 2007
CountryKorea, Republic of
CityJeju Island
Period07/12/607/12/8

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Discovering methodology and scenario to detect covert database system'. Together they form a unique fingerprint.

  • Cite this

    Lee, G. T., Lee, S., Tsomko, E., & Lee, S. (2007). Discovering methodology and scenario to detect covert database system. In Proceedings of Future Generation Communication and Networking, FGCN 2007 (pp. 130-135). [4426217] (Proceedings of Future Generation Communication and Networking, FGCN 2007; Vol. 2). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/fgcn.2007.106