DOC PREVIEW
UTD CS 4398 - Detection and Analysis of Database Tampering

This preview shows page 1-2-3-18-19-37-38-39 out of 39 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 39 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Digital ForensicsOutline: Review of Two Papers"Tamper Detection in Audit Logs“ Overview of PaperTransaction Time DatabaseSlide 5Slide 6"Tamper Detection in Audit Logs“ Main Steps of Basic Algorithm"Tamper Detection in Audit Logs“ ValidationHashing Functions Verifying the accuracy of the copyHashing Functions Reduce work load"Tamper Detection in Audit Logs“ Summary of main pointsDetails: Tamper Detection in Audit LogsCurrent Audit Log TechniquesDatabase Audit LogSlide 15Slide 16Threat ModelThe ApproachSlide 19Slide 20Slide 21Performance Improvements“Forensic Analysis of Database Tampering” Overview of PaperSlide 24Forensic Analysis of Database TamperingSlide 26Slide 27DefinitionsSlide 29Slide 30“Forensic Analysis of Database Tampering” Basic DefinitionsBasic Definitions“Forensic Analysis of Database Tampering” Monochromatic Forensic Analysis“Forensic Analysis of Database Tampering” Classification of Corruption Events“Forensic Analysis of Database Tampering” AlgorithmsSlide 36Slide 37ReferencesReading for Lecture November 2, 2011Digital ForensicsDr. Bhavani ThuraisinghamThe University of Texas at DallasDetection and Analysis of Database TamperingOctober 26, 2011Outline: Review of Two PapersRichard T. Snodgrass, Stanley Yao and Christian Collberg, "Tamper Detection in Audit Logs," In Proceedings of the International Conference on Very Large Databases, Toronto, Canada, August–September 2004, pp. 504–515. -Tamper Detection in Audit LogsDid the problem occur? (e.g. similar to intrusion detection)Kyri Pavlou and Richard T. Snodgrass, "Forensic Analysis of Database Tampering," in Proceedings of the ACM SIGMOD International Conference on Management of Data (SIGMOD), pages 109-120, Chicago, June, 2006.Who caused the problem (e.g., similar to digital forensics analysis)"Tamper Detection in Audit Logs“Overview of PaperEmphasize the fact that audit logs be correct and verifiable-Required now by several US Federal laws (e.g. Sarbanes-Oxley, HIPAA, etc.)Review of existing audit log techniquesPresentation of their basic idea (converting the audit log to a transaction time database with periodic validation and notarization)Give some performance enhancements (e.g. opportunistic hashing, linked hashing)Performance graphs and final summaryTransaction Time DatabaseA subset of “Temporal Databases”-http://en.wikipedia.org/wiki/Temporal_databaseA temporal database is a database that tracks, among other things, two different time parameters: valid-time and transaction-time. -Valid time denotes the time period during which a fact is true with respect to the real world (i.e. “real” time) -Transaction time refers to the time period during which a fact is stored in the database. Bitemporal data combines both Valid and Transaction Time.Transaction Time DatabaseRecords and retains the history of its content. [1]-All past states are retained and can be reconstructed from the information in the DB.Past state reconstruction enabled by the append only property: [1]-All new information is added only-No information is ever deleted. In addition, the transaction time component must be auditable. That is,-An audit log is maintained-Can be examined later by a validatorUltimate goal is to have enough information to both: -detect a bad event-determine exactly when, how, and by whom it occurred.Transaction Time DatabaseTransaction time table contains all the columns a normal database table might have, with two extra fields: Start and Stop. -START:tracks when the data item was added to the database (transaction time)-STOP:tracks different states of the row (tuple)Example operations that maintain history:-Deletion: STOP marked deleted, but row is retained-Modification: Deletion of old value; insertion of newInvisible to user; maintained by DBMS. Extra fields are carried for each tuple (row)."Tamper Detection in Audit Logs“Main Steps of Basic AlgorithmOn each modification of a tuple, the DBMS:-Gets a timestamp for the modification-Computes a cryptographically strong one-way hash of the (new) data and the time stamp together. -Sends that value to a trusted notarization service, which sends back a unique Notary ID based on that value. -The Notary ID is then stored with the tuple. If the data or timestamp are modified, the ID will be inconsistent with the new tuple (i.e. detected when rehashed and re-notarized). -Holds even if intruder has access to the hash function. He can calculate a new hash, but it won’t match the ID.It is very important that the ID cannot be calculated from the data in the database (i.e. must be calculated by an independent and trusted source):-This prevents an intruder from changing the database and then recalculating the ID."Tamper Detection in Audit Logs“ValidationAn independent and trusted audit log validation service can then be used to verify the integrity of the DB.For each tuple (basic algorithm), the validation service will rehash the data and time-stamp, recalculate the ID, and compare. Called a “Validation Event” (VE). Inconsistencies are reported as an “Corruption Event” (CE). Modern systems can update thousands of tuples per second, leading to time efficiency problems. Optimizations seek to minimize the time spent calculating hashes and interacting with the notarization service-Opportunistic hashing: Reduce the interactions with the notary to one per transaction, rather than to one per tuple.-Linked hashingFinal commit hash done at midnight each day. Reduces the interactions with the notary to one per day. creates a “hash chain” that can be used in later analysisHashing FunctionsVerifying the accuracy of the copy A hashing function can be used to generate a “digest” specific for each file. The digest is usually a hexadecimal number that is, with a high probability, unique for each file. A hashing function is secure if, for a given algorithm, it is computationally infeasible-to find a message that corresponds to a given message digest, or -to find two different messages that produce the same message digest (i.e. “collision”)In general, any change to a message will, with a very high probability, result in a different message digest. -Failure called a “collision”MD5 Hash Function-Most commonly used (although it has been shown to have flaws (i.e. collisions))-developed by Ronald Rivest, 1991.-produces a 32


View Full Document

UTD CS 4398 - Detection and Analysis of Database Tampering

Documents in this Course
Botnets

Botnets

33 pages

Botnets

Botnets

33 pages

Load more
Download Detection and Analysis of Database Tampering
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Detection and Analysis of Database Tampering and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Detection and Analysis of Database Tampering 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?