Threats to Privacy in the Forensic Analysis of Database Systems

Slides:



Advertisements
Similar presentations
Computer Forensic Analysis By Aaron Cheeseman Excerpt from Investigating Computer-Related Crime By Peter Stephenson (2000) CRC Press LLC - Computer Crimes.
Advertisements

Improving Transaction-Time DBMS Performance and Functionality David Lomet Microsoft Research Feifei Li Florida State University.
CookiesPHPMay-2007 : [‹#›] Maintaining State in PHP Part I - Cookies.
On the Privacy of Private Browsing Kiavash Satvat, Matt Forshaw, Feng Hao, Ehsan Toreini Newcastle University DPM’13.
Threats to privacy in the forensic analysis of database systems Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine Department of Computer Science.
This presentation will take a look at to prevent your information from being discovered by and investigator.
Auditing Computer-Based Information Systems
Unit 18 Data Security 1.
Computer Forensics, The Investigators Persepective Paul T. Mobley Sr. Computer Forensics Consultant Jawz Inc.
Guide to Computer Forensics and Investigations Fourth Edition
Evidor: The Evidence Collector Software using for: Software for lawyers, law firms, corporate law and IT security departments, licensed investigators,
Technology for Computer Forensics by Alicia Castro.
Chapter 8 Security Transparencies © Pearson Education Limited 1995, 2005.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
Testing - an Overview September 10, What is it, Why do it? Testing is a set of activities aimed at validating that an attribute or capability.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
Recovering and Examining Computer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google.
Recovery Techniques in Distributed Databases Naveen Jones December 5, 2011.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
Capturing Computer Evidence Extracting Information.
Damien Leake. Definition To examine digital media to identify and analyze information so that it can be used as evidence in court cases Involves many.
What is FORENSICS? Why do we need Network Forensics?
Chapter Oracle Server An Oracle Server consists of an Oracle database (stored data, control and log files.) The Server will support SQL to define.
Advanced Web Forms with Databases Programming Right from the Start with Visual Basic.NET 1/e 13.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory, Enhanced Chapter 4: Active Directory Architecture.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Data and its manifestations. Storage and Retrieval techniques.
Optimized Transaction Time Versioning Inside a Database Engine Intern: Feifei Li, Boston University Mentor: David Lomet, MSR.
Module 15 Managing Windows Server® 2008 Backup and Restore.
Chapter No 4 Query optimization and Data Integrity & Security.
ITGS Databases.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Understand Audit Policies LESSON Security Fundamentals.
Chao-Hsien Chu, Ph.D. College of Information Sciences and Technology The Pennsylvania State University University Park, PA Search.
CIT 180 Security Fundamentals Computer Forensics.
Chapter 11 Analysis Methodology Spring Incident Response & Computer Forensics.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
Digital Forensics Anthony Lawrence. Overview Digital forensics is a branch of forensics focusing on investigating electronic devises. Important in for.
Lecture 19 Page 1 CS 236 Online 6. Application Software Security Why it’s important: –Security flaws in applications are increasingly the attacker’s entry.
ORACLE's Approach ORALCE uses a proprietary mechanism for security. They user OLS.... ORACLE Labeling Security. They do data confidentiality They do adjudication.
With Temporal Tables and More
Creighton Barrett Dalhousie University Archives
Database Recovery Techniques
Compression and Storage Optimization IDS xC4 Kevin Cherkauer
CE 454 Computer Architecture
Cloud Security– an overview Keke Chen
Transactional Recovery and Checkpoints
Memory Management 6/20/ :27 PM
Essentials of UrbanCode Deploy v6.1
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
BA Yearend Procedure.
Managing the IT Function
Managing Multi-user Databases
A 5-minute overview of ADAudit Plus
Instructor 彭智勇 武汉大学软件工程国家重点实验室 电话:
Database Backup and recovery
Bethesda Cybersecurity Club
Computer Forensics Lab 1 INFORMATION TECHNOLOGY DEPARTMENT LEBANESE FRENCH UNIVERSITY (LFU) COURSE CODE: IT402CF 1.
DEPLOYING SECURITY CONFIGURATION
How does the deep web work?
Data Recovery: Why Secure Deletion is so Important.
COMP755 Advanced Operating Systems
Protect data in core business applications
A SIEM for the Forensic Analysis of Database Management System Logs
Database management systems
Presentation transcript:

Threats to Privacy in the Forensic Analysis of Database Systems Andy Michels CSCE 824 18.04.2019

Overview Introduction How Data Remnants are Preserved Example - File Carving System Transparency Proposal Specific Techniques for Record Deletion Log Expunction Conclusion

Introduction Preserving historical data / records of activities is important Recover after system failures Forensic analysis of past events (hacks, breaches) Audit compliance with security policies (especially with government computer systems) Computer system use will unintentionally leave traces of expired data No precise control over data destruction = remnants of past data can become a problem Introduction Using any kind of computer system will unintentionally leave traces of expired data and remnants of users’ past activities Preserving historical data / records of activities is important Recover after system failures Forensic analysis of past events (hacks, breaches) Audit compliance with security policies (especially with government computer systems) This is good, but retaining history can pose a threat to privacy No precise control over data destruction = remnants of past data can become a problem E.g., table storage, indexes, logs, materialized views, temporary relations These kinds of data are revealed through forensic analysis - the collection and analysis of data recovered from computer systems Good for authorized investigators to use, but not good for unauthorized parties to use Proposition: forensically transparent system. This means that all the data kept by a computer should be accessible through a legitimate interface; hidden data should not able to be recovered through inspection Database storage - embedded in applications for persistence (email, web browsers, Google Desktop, etc.) Essentially a sophisticated replacement for cookies.

Introduction Forensic analysis - the collection and analysis of data recovered from computer systems Good for authorized investigators to use, but not good for unauthorized parties to use Proposal: Forensically Transparent System All the data kept by a computer should be accessible through a legitimate interface

How Data Remnants are Preserved Sources: RAM document files web browsers Forensic tools (Sleuth Toolkit, EnCASE Forensic) Files must be overwritten E.g., DBAN (Darik’s Boot and Nuke) How Data Remnants are Preserved Sources - RAM, document files, web browsers. All sorts of data everywhere that are stored. Again, think of it like sophisticated cookies. Forensic tools (Sleuth Toolkit, EnCASE Forensic) used by investigators As computer scientists, we know that files must be overwritten to be truly deleted E.g., wiping computers using programs like DBAN (Darik’s Boot and Nuke, an open source tool used to scramble bytes with zeroes / random sequences)

Example - File Carving File Carving - the process of searching for patterns in bits (File Signatures or “Magic Numbers”) E.g., JPEG files the leading bits will always be 0xFFD8FFE3 the trailing bits will always be 0xFFD9 Scalpel - file carving forensics program Can find files specifically related to databases like this as well (.sqlite, .db, etc.) Limitations: Fragmented files Compression Disk encryption Example Given a disk, there are tools out there to interpret common file types (usually in the form of hexadecimal dumps) File carving is the process of searching for patterns in bits (File Signatures or “Magic Numbers”) For JPEG files, the leading bits will always be 0xFFD8FFE3 and the trailing bits will always be 0xFFD9 Scalpel - one such program for file carving used in forensics. You can specify which signature you’d like to find in the configuration file and then run the program on a given disk You can find files specifically related to databases like this as well (.sqlite, .db, etc.) Obviously, this doesn’t really work if you have fragmented files, compression, or disk encryption, but it is a good example of what kind of tools are out there to recover private data from a disk.

System Transparency Proposal Anyone with access to lower layer interfaces can read unintentionally retained data Forensically transparent if the database system is: The impact of each operation on the state of the records (active, inactive) is clear Only active records should be retained by the database Expired records must be removed after a period of time when they become expired System Transparency Proposal Anyone with access to lower layer interfaces can read unintentionally retained data The database system can provide an unreliable view of the actual stored contents of the system Serious impact on privacy Malicious users can access information that is persistent Forensically transparent if the database system is: The impact of each operation on the state of the records (active, inactive) is clear Only active records should be retained by the database Expired records must be removed after a period of time when they become expired

Specific Techniques for Record Deletion Tables are stored in paged files Records share the storage space of one page Deletion bit - data is not fully removed and is still recoverable Vacuum component: Improves storage performance, but time-consuming Size of table storage may be reduced Makes more space within the file system ...but does not completely remove the data Specific Techniques for Record Deletion and Log Expunction In database systems, tables are stored in paged files and a lot of records share the storage space of one page. Deletion of records accomplished by setting a deletion bit - data is not fully removed and is still recoverable There is also a vacuum component - executed by the database administrator Improves storage performance, but time-consuming Size of table storage may be reduced. Makes more space within the file system, but does not completely remove the data. They’re just unallocated and recoverable.

Log Expunction Logs - prior states of the database can and will be retained (contains sensitive data) Depends on the... capacity of the log file rate of updates log space required by update frequency of checkpointing Large companies = cycles log files quickly Small companies = cycles log files slowly Logs - prior states of the database can and will be retained (contains sensitive data) Lots of variables with this - depends on the 1) capacity of the log file 2) rate of updates 3) log space required by update 4) frequency of checkpointing This means large companies with a lot of transaction processing may cycle through their log file in a few days or once per day. Contrarily, logs could keep months upon months of data.

Log Expunction Transparency with Logs data should be deleted as soon as it is no longer needed for recovery Parts of the log will never be used by the recovery manager, so those types should be deleted Transparency with Logs - data should be deleted as soon as it is no longer needed for recovery. Parts of the log will never be used by the recovery manager, so those types should be deleted Lots of varying amounts of data retention for expired data

Conclusions Data that can be recovered = threat to privacy Preserving history and logs within databases gives a record of what occurred within applications Databases provide false view of data More analysis of specific databases would be beneficial Data that can be recovered and used to identify users poses a threat to privacy; there is a problem with unintended data retention Preserving history and logs within databases gives a record of what occurred within applications Database systems fail to remove data and provide a false view of said data Having said that, a specific approach does not exist for this solution in addition to the fact that there are several performance trade-offs in determining unintended data retention This means that the experiments are not exhaustive. There still could be more analysis done that targets specific database applications Adding details to determine what specific types of algorithms could; further research is required, especially on database systems that do not include MySQL

Works Cited Stahlberg, Patrick, et al. “Threats to Privacy in the Forensic Analysis of Database Systems.” Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data - SIGMOD '07, 2007, doi:10.1145/1247480.1247492. https://filesignatures.net/index.php?page=search