ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Detecting Forgery in Trigger Based Database Transaction

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 5)

Publication Date:

Authors : ; ;

Page : 1444-1446

Keywords : SQL Trigger; Database SQL Injection Attacks; Database watcher; File log; Trigger Schema Table;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Nowadays, traditional digital investigations often excluded databases even though evidence can usually be found in them. Although the field is still in its early years, it is quickly becoming an important part of many investigations due to the increased volume of information, that may be helpful in solving different crimes and the greater risks associated with the data stored on many databases. Of major importance in database, forensics is the ability to retrace the operations performed on a database and reconstruct deleted or compromised information on the database. This requirement affects the data collection and analysis process during the forensics analysis of a database. An aspect of database forensics that has not received much awareness in the academic research community yet is the presence of database triggers. Database triggers and their implementations have not yet been thoroughly analysed to establish what possible impact they could have on digital forensic analysis methods and processes. Conventional database triggers are defined to execute automatic actions based on changes in the database. This paper attempts to develop an application, which can interface with MySQL database, helps to detect the SQL injection hijacking and reverse the actions of the intruder. This helps to protect the credibility of an organization.

Last modified: 2021-07-01 14:37:34