SlideShare a Scribd company logo
Hybrid Logical Clocks for DB Forensics
Filing the Gap between Chain of Custody and Database Auditing.
Denys A. Flores & Arshad Jhumka
Rotorua, New Zealand
August 6th, 2019
Topics
 The Insider Adversary and Transactional Databases
 Proactive Database Forensics
 Towards a Forensically-Aware DB Architecture
 Vector Clocks vs. Hybrid Logical Clocks
 Proposed Forensic Controllers
 Results
 Conclusions and Future Work
Databases are in everything…
The Insider Adversary and Transactional Databases
Database Forensics allows investigating malicious DML operations (inserts,
updates, deletes) performed by trusted insiders who could misuse their
privileged access [1].
Database audit records become important evidence for investigating
privileged access misuse in order to disclose or contaminate [2] sensitive
transactional information [3].
Admissibility of audit records is challenged due to the lack of accountability
and forensic features within the database environment.
As a result, malicious insiders may cover up their activities by making them
look as authorized [4].
Reactive vs. Proactive Database Forensics
Reactive DB Forensics
Aims reconstructing the ‘original’ DB state [5] - bottom-up.
Adapts traditional forensic techniques such as table-relationship
analysis [7] and data file carving [8].
Challenges evidence admissibility due to lack of formalization [9]
Leads to conjectures about insider behavior as evidence may be
partially recovered or unavailable.
Proactive DB Forensics
Uses pre-designed forensic features of a DB [6] for auditing insider
activities – top-down.
Generates, collects and preserves DB audit records [10] within a
forensically ready environment.
Admissibility depends on properly justifying Chain of Custody in the
system operation.
Audit records provide more insider activity traces which may not be
possible to identify within reactively recovered evidence.
Chain of Custody (CoCCoCCoCCoC)
Describes the evidence continuum, providing an unbroken accountability trail to justify
every action performed on a piece of evidence, in accordance with 4 generally accepted
principles [12]:
Building an accurate timeline of events is key!
CoC-based System Properties
CoC properties: Role segregation, provenance, event timelining and causality
We aim to build an accurate timeline about the occurrence of DML operations.
In distributed systems with high concurrency, causality violations may happen
unexpectedly.
Its difficult to certainly know whether an event ‘happen before’ another.
Vector Clocks and Hybrid Logical Clocks have been used to solve this problem.
Vector Clocks (VCVCVCVC) vs. Hybrid Logical Clocks (HLCHLCHLCHLC)
VC logical timestamps Vm.τ[i] in Tι,
representing the current observed logical
clock value of each audit store Fi ∈ FDB.
Notice that size(Vm) = |FDB| .
Used in multi-version databases,
HLC logical timestamps Vm.τm
composed of tuples <pt, l, c>
representing instant physical time,
maximum physical time and a
concurrency flag, respectively.
Forensically-Aware Distributed DB Architecture
Forensically-Aware Distributed DB Architecture
A. Concurrent DMLDMLDMLDML Request Generator: A Master Event Generator (MeGen)
and Client Event Generators (CeGen), implemented in JMeter in master-
slave mode in order to produce synthetic workload to emulate concurrent
DML requests.
B. Transactional (NNNNDBDBDBDB) and Forensic (FFFFDBDBDBDB) Databases: implemented in
MSSQL Server 2014 with operative (DBuser), administrative (DBadmin) and
forensic (DBforensics) roles enabled. For HLC, these databases are
deployed in Linked Server mode and synchronised with an NTP-based time
service.
C. Proactive Database Forensic Controllers: implemented using Common
Language Runtime (CLR) C# Assemblies, and deployed as triggers and stored
procedures in their respective databases with exclusive enable/disable
permissions assigned to DBforensics.
Generation and Collection of Audit Records
Preservation of Audit Records
• A timeline Tι ∈ FDB is a sequence of timestamps Vm, such
that:
• VC Timestamp (logical order):
• HLC Timestamp (logical order + Unix Time):
Collection and Preservation of Audit Records
Results
7. Conclusions and Future Work
HLCHLCHLCHLC is more scalable and accurate than our previous VCVCVCVC –based proposal
Without any optimization, 70% of transactions with HLCHLCHLCHLC commit in up to 3.5
secs (test 720 operations per test scenario)
However, a baseline has been established for developing more research in the
field of proactive DB Forensics and CoC admissibility of audit records.
Future work involves:
(a) Formally proving the architecture’s correctness in terms of compliance
with CoC-based system properties
(b) Improving overhead during timeline construction to perform better with
high transactional workload (more than 10,000 operations per test
scenario)
Denys A. Flores
PhD Candidate
Department of Computer Science
University of Warwick
email: d.flores-armas@warwick.ac.uk
web: go.warwick.ac.uk/dflores
Thank You!

More Related Content

What's hot

TCP connection management in SDN
TCP connection management in SDNTCP connection management in SDN
TCP connection management in SDN
Chao Chen
 
Hard real time db tsp
Hard real time db tspHard real time db tsp
Hard real time db tsp
Pradeep Kumar TS
 
PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...
PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...
PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...
I3E Technologies
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
Nagamalleswararao Tadikonda
 
Toward secure and dependable
Toward secure and dependableToward secure and dependable
Toward secure and dependable
IMPULSE_TECHNOLOGY
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
IMPULSE_TECHNOLOGY
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
Nagamalleswararao Tadikonda
 
Real time databases
Real time databasesReal time databases
Real time databases
Nipuna Hewamadduma
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
Pvrtechnologies Nellore
 
Secure cloud storage with data dynamic using secure network coding technique
Secure cloud storage with data dynamic using secure network coding techniqueSecure cloud storage with data dynamic using secure network coding technique
Secure cloud storage with data dynamic using secure network coding technique
Venkat Projects
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
Adz91 Digital Ads Pvt Ltd
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
Nexgen Technology
 
Session19 Globus
Session19 GlobusSession19 Globus
Session19 Globus
ISSGC Summer School
 

What's hot (13)

TCP connection management in SDN
TCP connection management in SDNTCP connection management in SDN
TCP connection management in SDN
 
Hard real time db tsp
Hard real time db tspHard real time db tsp
Hard real time db tsp
 
PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...
PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...
PERFORMING INITIATIVE DATA PREFETCHING IN DISTRIBUTED FILE SYSTEMS FOR CLOUD ...
 
Privacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-basedPrivacy preserving public auditing for regenerating-code-based
Privacy preserving public auditing for regenerating-code-based
 
Toward secure and dependable
Toward secure and dependableToward secure and dependable
Toward secure and dependable
 
Cooperative provable data possession for
Cooperative provable data possession forCooperative provable data possession for
Cooperative provable data possession for
 
Provable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systemsProvable multi copy dynamic data possession in cloud computing systems
Provable multi copy dynamic data possession in cloud computing systems
 
Real time databases
Real time databasesReal time databases
Real time databases
 
Secure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliabilitySecure distributed deduplication systems with improved reliability
Secure distributed deduplication systems with improved reliability
 
Secure cloud storage with data dynamic using secure network coding technique
Secure cloud storage with data dynamic using secure network coding techniqueSecure cloud storage with data dynamic using secure network coding technique
Secure cloud storage with data dynamic using secure network coding technique
 
A hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplicationA hybrid cloud approach for secure authorized deduplication
A hybrid cloud approach for secure authorized deduplication
 
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUDSECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
SECURE AUDITING AND DEDUPLICATING DATA IN CLOUD
 
Session19 Globus
Session19 GlobusSession19 Globus
Session19 Globus
 

Similar to D flores trust-com19-pres

Aquarius - A Data-Centric approach to CORBA fault-tolerance
Aquarius - A Data-Centric approach to CORBA fault-toleranceAquarius - A Data-Centric approach to CORBA fault-tolerance
Aquarius - A Data-Centric approach to CORBA fault-tolerance
Barak Merimovich
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
1crore projects
 
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
neirew J
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
ijccsa
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
ijsrd.com
 
Proactive ops for container orchestration environments
Proactive ops for container orchestration environmentsProactive ops for container orchestration environments
Proactive ops for container orchestration environments
Docker, Inc.
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
IJERA Editor
 
DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...
DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...
DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...
ijdms
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
IJTET Journal
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
IJET - International Journal of Engineering and Techniques
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
IJCERT
 
Review_2013
Review_2013Review_2013
Review_2013
Jonathan Sinclair
 
An4201262267
An4201262267An4201262267
An4201262267
IJERA Editor
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics Platform
DATAVERSITY
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
Finalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
Finalyear Projects
 
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
IRJET Journal
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
IJSRD
 

Similar to D flores trust-com19-pres (20)

Aquarius - A Data-Centric approach to CORBA fault-tolerance
Aquarius - A Data-Centric approach to CORBA fault-toleranceAquarius - A Data-Centric approach to CORBA fault-tolerance
Aquarius - A Data-Centric approach to CORBA fault-tolerance
 
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud StoragePrivacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
Privacy-Preserving Public Auditing for Regenerating-Code-Based Cloud Storage
 
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
Intrusion Detection and Marking Transactions in a Cloud of Databases Environm...
 
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENTINTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
INTRUSION DETECTION AND MARKING TRANSACTIONS IN A CLOUD OF DATABASES ENVIRONMENT
 
DATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUDDATA PROVENENCE IN PUBLIC CLOUD
DATA PROVENENCE IN PUBLIC CLOUD
 
Proactive ops for container orchestration environments
Proactive ops for container orchestration environmentsProactive ops for container orchestration environments
Proactive ops for container orchestration environments
 
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
Efficient Implementation of Proof of Retrievability (OPOR) In Cloud Computing...
 
DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...
DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...
DESIGN, IMPLEMENTATION AND PERFORMANCE ANALYSIS OF CONCURRENCY CONTROL ALGORI...
 
Periodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random BitsPeriodic Auditing of Data in Cloud Using Random Bits
Periodic Auditing of Data in Cloud Using Random Bits
 
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
[IJET-V2I2P9] Authors:Reshma A. Hegde1, Madhura Prakash
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and DeduplicationSecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
SecCloudPro: A Novel Secure Cloud Storage System for Auditing and Deduplication
 
Review_2013
Review_2013Review_2013
Review_2013
 
An4201262267
An4201262267An4201262267
An4201262267
 
Estimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics PlatformEstimating the Total Costs of Your Cloud Analytics Platform
Estimating the Total Costs of Your Cloud Analytics Platform
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
 
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...Survey on Division and Replication of Data in Cloud for Optimal Performance a...
Survey on Division and Replication of Data in Cloud for Optimal Performance a...
 

More from Denys A. Flores, PhD

Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackers
Denys A. Flores, PhD
 
eDem&eGov 2014
eDem&eGov 2014eDem&eGov 2014
eDem&eGov 2014
Denys A. Flores, PhD
 
Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014
Denys A. Flores, PhD
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
Denys A. Flores, PhD
 
Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013
Denys A. Flores, PhD
 
TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227
Denys A. Flores, PhD
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
Denys A. Flores, PhD
 
Database forensics
Database forensicsDatabase forensics
Database forensics
Denys A. Flores, PhD
 

More from Denys A. Flores, PhD (8)

Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackers
 
eDem&eGov 2014
eDem&eGov 2014eDem&eGov 2014
eDem&eGov 2014
 
Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014Memorias del Campus Party Quito 2014
Memorias del Campus Party Quito 2014
 
eDem&eGov 2013
eDem&eGov 2013eDem&eGov 2013
eDem&eGov 2013
 
Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013Memorias del Campus Party Quito 2013
Memorias del Campus Party Quito 2013
 
TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227TrustCom-16 - Paper ID 227
TrustCom-16 - Paper ID 227
 
WPCCS 16 Presentation
WPCCS 16 PresentationWPCCS 16 Presentation
WPCCS 16 Presentation
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 

Recently uploaded

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

D flores trust-com19-pres

  • 1. Hybrid Logical Clocks for DB Forensics Filing the Gap between Chain of Custody and Database Auditing. Denys A. Flores & Arshad Jhumka Rotorua, New Zealand August 6th, 2019
  • 2. Topics  The Insider Adversary and Transactional Databases  Proactive Database Forensics  Towards a Forensically-Aware DB Architecture  Vector Clocks vs. Hybrid Logical Clocks  Proposed Forensic Controllers  Results  Conclusions and Future Work
  • 3. Databases are in everything…
  • 4. The Insider Adversary and Transactional Databases Database Forensics allows investigating malicious DML operations (inserts, updates, deletes) performed by trusted insiders who could misuse their privileged access [1]. Database audit records become important evidence for investigating privileged access misuse in order to disclose or contaminate [2] sensitive transactional information [3]. Admissibility of audit records is challenged due to the lack of accountability and forensic features within the database environment. As a result, malicious insiders may cover up their activities by making them look as authorized [4].
  • 5. Reactive vs. Proactive Database Forensics Reactive DB Forensics Aims reconstructing the ‘original’ DB state [5] - bottom-up. Adapts traditional forensic techniques such as table-relationship analysis [7] and data file carving [8]. Challenges evidence admissibility due to lack of formalization [9] Leads to conjectures about insider behavior as evidence may be partially recovered or unavailable. Proactive DB Forensics Uses pre-designed forensic features of a DB [6] for auditing insider activities – top-down. Generates, collects and preserves DB audit records [10] within a forensically ready environment. Admissibility depends on properly justifying Chain of Custody in the system operation. Audit records provide more insider activity traces which may not be possible to identify within reactively recovered evidence.
  • 6. Chain of Custody (CoCCoCCoCCoC) Describes the evidence continuum, providing an unbroken accountability trail to justify every action performed on a piece of evidence, in accordance with 4 generally accepted principles [12]: Building an accurate timeline of events is key!
  • 7. CoC-based System Properties CoC properties: Role segregation, provenance, event timelining and causality We aim to build an accurate timeline about the occurrence of DML operations. In distributed systems with high concurrency, causality violations may happen unexpectedly. Its difficult to certainly know whether an event ‘happen before’ another. Vector Clocks and Hybrid Logical Clocks have been used to solve this problem.
  • 8. Vector Clocks (VCVCVCVC) vs. Hybrid Logical Clocks (HLCHLCHLCHLC) VC logical timestamps Vm.τ[i] in Tι, representing the current observed logical clock value of each audit store Fi ∈ FDB. Notice that size(Vm) = |FDB| . Used in multi-version databases, HLC logical timestamps Vm.τm composed of tuples <pt, l, c> representing instant physical time, maximum physical time and a concurrency flag, respectively.
  • 10. Forensically-Aware Distributed DB Architecture A. Concurrent DMLDMLDMLDML Request Generator: A Master Event Generator (MeGen) and Client Event Generators (CeGen), implemented in JMeter in master- slave mode in order to produce synthetic workload to emulate concurrent DML requests. B. Transactional (NNNNDBDBDBDB) and Forensic (FFFFDBDBDBDB) Databases: implemented in MSSQL Server 2014 with operative (DBuser), administrative (DBadmin) and forensic (DBforensics) roles enabled. For HLC, these databases are deployed in Linked Server mode and synchronised with an NTP-based time service. C. Proactive Database Forensic Controllers: implemented using Common Language Runtime (CLR) C# Assemblies, and deployed as triggers and stored procedures in their respective databases with exclusive enable/disable permissions assigned to DBforensics.
  • 11. Generation and Collection of Audit Records
  • 12. Preservation of Audit Records • A timeline Tι ∈ FDB is a sequence of timestamps Vm, such that: • VC Timestamp (logical order): • HLC Timestamp (logical order + Unix Time):
  • 13. Collection and Preservation of Audit Records
  • 15. 7. Conclusions and Future Work HLCHLCHLCHLC is more scalable and accurate than our previous VCVCVCVC –based proposal Without any optimization, 70% of transactions with HLCHLCHLCHLC commit in up to 3.5 secs (test 720 operations per test scenario) However, a baseline has been established for developing more research in the field of proactive DB Forensics and CoC admissibility of audit records. Future work involves: (a) Formally proving the architecture’s correctness in terms of compliance with CoC-based system properties (b) Improving overhead during timeline construction to perform better with high transactional workload (more than 10,000 operations per test scenario)
  • 16. Denys A. Flores PhD Candidate Department of Computer Science University of Warwick email: d.flores-armas@warwick.ac.uk web: go.warwick.ac.uk/dflores Thank You!