{"title":"发现隐蔽数据库系统的方法和场景","authors":"G. Lee, Seokhee Lee, E. Tsomko, Sangjin Lee","doi":"10.1109/FGCN.2007.106","DOIUrl":null,"url":null,"abstract":"When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 3","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":"{\"title\":\"Discovering Methodology and Scenario to Detect Covert Database System\",\"authors\":\"G. Lee, Seokhee Lee, E. Tsomko, Sangjin Lee\",\"doi\":\"10.1109/FGCN.2007.106\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.\",\"PeriodicalId\":254368,\"journal\":{\"name\":\"Future Generation Communication and Networking (FGCN 2007)\",\"volume\":\"1 3\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-12-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"13\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Future Generation Communication and Networking (FGCN 2007)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FGCN.2007.106\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Future Generation Communication and Networking (FGCN 2007)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FGCN.2007.106","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Discovering Methodology and Scenario to Detect Covert Database System
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.