Forensic Analysis of Database Tampering

13
Raul Quinonez CS 4398 Digital Forensics 10/25/13

description

Forensic Analysis of Database Tampering. Raul Quinonez CS 4398 Digital Forensics 10/25/13. Introduction. How to detect tampering? What data has been tampered? Who did it via forensic analysis?. Tamper Detection. Cryptographic Hashing functions Normal Processing Phase - PowerPoint PPT Presentation

Transcript of Forensic Analysis of Database Tampering

Page 1: Forensic Analysis of Database Tampering

Raul QuinonezCS 4398 Digital Forensics10/25/13

Page 2: Forensic Analysis of Database Tampering

How to detect tampering?

What data has been tampered?

Who did it via forensic analysis?

Page 3: Forensic Analysis of Database Tampering

Cryptographic Hashing functions

Normal Processing Phase

Digital Normalization Service

Page 4: Forensic Analysis of Database Tampering

Each transaction is hashed

Identify corrupted stored data transactions

Focus on original time of transaction and time of corrupted transaction

Several corrupted tuples- Multi-locus

Single corrupted tuple- Single-locus

Page 5: Forensic Analysis of Database Tampering
Page 6: Forensic Analysis of Database Tampering

MonochromaticCumulative hash chains (black)

RGBYThree types of chains (Red, green, blue)

Tiled BitmapTiles of chains over continous data segments

a3D AlgorithmPartial hash chanis changes with transaction time

Page 7: Forensic Analysis of Database Tampering
Page 8: Forensic Analysis of Database Tampering
Page 9: Forensic Analysis of Database Tampering
Page 10: Forensic Analysis of Database Tampering
Page 11: Forensic Analysis of Database Tampering

Tiled bitmap is the cheapest

Monochromatic is the easiest to implement

RGBY is the best option for larger corruption cases

a3D Algorithm has a constant cost

Page 12: Forensic Analysis of Database Tampering

How, what and who?

Forensic Algorithms

Comparison of algorithms

Page 13: Forensic Analysis of Database Tampering

Kyri Pavlou and Richard T. Snodgrass, "Forensic Analysis of Database Tampering," in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pages 109-120, Chicago, June, 2006.