Discovering methodology and scenario to detect covert database system

Gu Taek Lee, Seokhee Lee, Elena Tsomko, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.

Original languageEnglish
Title of host publicationProceedings of Future Generation Communication and Networking, FGCN 2007
Pages130-135
Number of pages6
Volume2
Publication statusPublished - 2007 Dec 1
Event2007 International Conference on Future Generation Communication and Networking, FGCN 2007 - Jeju Island, Korea, Republic of
Duration: 2007 Dec 62007 Dec 8

Other

Other2007 International Conference on Future Generation Communication and Networking, FGCN 2007
CountryKorea, Republic of
CityJeju Island
Period07/12/607/12/8

Fingerprint

Industry
Digital forensics

ASJC Scopus subject areas

  • Computer Science Applications
  • Software
  • Electrical and Electronic Engineering

Cite this

Lee, G. T., Lee, S., Tsomko, E., & Lee, S. (2007). Discovering methodology and scenario to detect covert database system. In Proceedings of Future Generation Communication and Networking, FGCN 2007 (Vol. 2, pp. 130-135). [4426217]

Discovering methodology and scenario to detect covert database system. / Lee, Gu Taek; Lee, Seokhee; Tsomko, Elena; Lee, Sangjin.

Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2 2007. p. 130-135 4426217.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lee, GT, Lee, S, Tsomko, E & Lee, S 2007, Discovering methodology and scenario to detect covert database system. in Proceedings of Future Generation Communication and Networking, FGCN 2007. vol. 2, 4426217, pp. 130-135, 2007 International Conference on Future Generation Communication and Networking, FGCN 2007, Jeju Island, Korea, Republic of, 07/12/6.
Lee GT, Lee S, Tsomko E, Lee S. Discovering methodology and scenario to detect covert database system. In Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2. 2007. p. 130-135. 4426217
Lee, Gu Taek ; Lee, Seokhee ; Tsomko, Elena ; Lee, Sangjin. / Discovering methodology and scenario to detect covert database system. Proceedings of Future Generation Communication and Networking, FGCN 2007. Vol. 2 2007. pp. 130-135
@inproceedings{8db908d3f47d4863bc2da31a204f8c5b,
title = "Discovering methodology and scenario to detect covert database system",
abstract = "When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.",
author = "Lee, {Gu Taek} and Seokhee Lee and Elena Tsomko and Sangjin Lee",
year = "2007",
month = "12",
day = "1",
language = "English",
isbn = "0769530486",
volume = "2",
pages = "130--135",
booktitle = "Proceedings of Future Generation Communication and Networking, FGCN 2007",

}

TY - GEN

T1 - Discovering methodology and scenario to detect covert database system

AU - Lee, Gu Taek

AU - Lee, Seokhee

AU - Tsomko, Elena

AU - Lee, Sangjin

PY - 2007/12/1

Y1 - 2007/12/1

N2 - When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.

AB - When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.

UR - http://www.scopus.com/inward/record.url?scp=52249110055&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=52249110055&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:52249110055

SN - 0769530486

SN - 9780769530482

VL - 2

SP - 130

EP - 135

BT - Proceedings of Future Generation Communication and Networking, FGCN 2007

ER -