Analysis of connection information for database server detection

Jisung Han, Keun Gi Lee, Joonho Choi, Kyung Soo Lim, Sangjin Lee

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)

    Abstract

    The advance in mass data processing technology allowed companies to possess various computer resources, including database, regardless of the companies' scale. When investigating companies, it is crucial for investigators to search for database server that contains data of accounting and HR. However, detecting the database server inside many computer resources is often obstructed by noncooperation of the target companies. Thus, it is crucial to study methods for efficient database detection. So that, In this paper, we propose client-based methods for detecting database by analyzing connection information of the database server, which is stored on the client system by SQL development tool. We also introduce the implementation of a tool that can automatically extract and analyze this information.

    Original languageEnglish
    Title of host publicationProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
    DOIs
    Publication statusPublished - 2009
    Event2009 2nd International Conference on Computer Science and Its Applications, CSA 2009 - Jeju Island, Korea, Republic of
    Duration: 2009 Dec 102009 Dec 12

    Publication series

    NameProceedings of the 2009 2nd International Conference on Computer Science and Its Applications, CSA 2009

    Other

    Other2009 2nd International Conference on Computer Science and Its Applications, CSA 2009
    Country/TerritoryKorea, Republic of
    CityJeju Island
    Period09/12/1009/12/12

    Keywords

    • Component
    • Connection information
    • Database
    • Database forensic
    • Detection
    • Forensic tool

    ASJC Scopus subject areas

    • Computational Theory and Mathematics
    • Computer Science Applications

    Fingerprint

    Dive into the research topics of 'Analysis of connection information for database server detection'. Together they form a unique fingerprint.

    Cite this