Analysis of connection information for database server detection

Jisung Han, Keun Gi Lee, Joonho Choi, Kyung Soo Lim, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

The advance in mass data processing technology allowed companies to possess various computer resources, including database, regardless of the companies' scale. When investigating companies, it is crucial for investigators to search for database server that contains data of accounting and HR. However, detecting the database server inside many computer resources is often obstructed by noncooperation of the target companies. Thus, it is crucial to study methods for efficient database detection. So that, In this paper, we propose client-based methods for detecting database by analyzing connection information of the database server, which is stored on the client system by SQL development tool. We also introduce the implementation of a tool that can automatically extract and analyze this information.

Original languageEnglish
Title of host publicationProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
DOIs
Publication statusPublished - 2009
Event2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 - Jeju Island, Korea, Republic of
Duration: 2009 Dec 102009 Dec 12

Publication series

NameProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009

Other

Other2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
Country/TerritoryKorea, Republic of
CityJeju Island
Period09/12/1009/12/12

Keywords

  • Component
  • Connection information
  • Database
  • Database forensic
  • Detection
  • Forensic tool

ASJC Scopus subject areas

  • Computational Theory and Mathematics
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'Analysis of connection information for database server detection'. Together they form a unique fingerprint.

Cite this