Binary Log Analysis on MySQL to Help Investigation Process Against Database Privillege Attacks
Abstract
Abstract—Database is an important part in managing information, because a database is a collection of data that is processed to produce information. because of the importance of the database, many crimes are directed to attack the database, both attacks against access rights or attacks against the data itself. My SQL is a Database Management System (DBMS) that provides several facilities, one of which is the logging facility. Binary Log is a type of database log in the form of binary digits that contains some information including the record of the time of the transaction, the user who made the transaction and the order in the transaction. With the Binary Log, it can be seen when the transaction occurred, who made the transaction and what transaction occurred in the database. The recording of transactions in the Binary Log can be used as one way to carry out an investigation process in the event of an attack on the database. In this study the focus is on analyzing transaction records in binary logs, namely when, who, dam and what information can be taken from the Binary Log. The output of this research is a table of binary log investigation results and its relation to database attacks.
Full Text:
PDFReferences
1. M. Shen, M. Chen, M. Li, and L. Liu, “Least Privilege for Database Administrators,” vol. 26, pp. 50–55, 2013.
2. P. Fr, P. Kieseberg, S. Schrittwieser, M. Huber, and E. Weippl, “InnoDB Database Forensics : Reconstructing Data Manipulation Queries from Redo Logs,” 2010.
3. H. K. Khanuja and D. S. Adane, “Ramework for database forensic analysis,” vol. 2, no. 3, pp. 27–41, 2012.
4. A. Rosenthal and E. Sciore, “Extending SQL ’ s Grant and Revoke Operations ,” pp. 1–16, 2000.
5. Chavan Jitendra R. and H. K. Khanuja, “Database Forensic Analysis Using Log Files,” Int. J. Eng. Res. Appl., no. April, pp. 6–9, 2014.
6. P. Frühwirt, P. Kieseberg, S. Schrittwieser, M. Huber, and E. Weippl, “InnoDB database forensics: Enhanced reconstruction of data manipulation queries from redo logs,” Inf. Secur. Tech. Rep., vol. 17, no. 4, pp. 227–238, 2013.
7. K. Fowler and G. Gold, “SQL Server Database Forensics,” Memory, 2007.
8. Abdullah, Robi W., et al. "Keamanan Basis Data pada Perancangan Sistem Kepakaran Prestasi Sman Dikota Surakarta." Creative Communication and Innovative Technology Journal, vol. 12, no. 1, 2019, pp. 13-21.
9. Muqorobin, M., Apriliyani, A., & Kusrini, K. (2019). Sistem Pendukung Keputusan Penerimaan Beasiswa dengan Metode SAW. Respati, 14(1).
10. Muqorobin, M., Hisyam, Z., Mashuri, M., Hanafi, H., & Setiyantara, Y. (2019). Implementasi Network Intrusion Detection System (NIDS) Dalam Sistem Keamanan Open Cloud Computing. Majalah Ilmiah Bahari Jogja, 17(2), 1-9.
11. K. Kusrini, E. T. Luthfi, M. Muqorobin and R. W. Abdullah, "Comparison of Naive Bayes and K-NN Method on Tuition Fee Payment Overdue Prediction," 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Yogyakarta, Indonesia, 2019, pp. 125-130, doi: 10.1109/ICITISEE48480.2019.9003782.
12. Muqorobin, M., Kusrini, K., Rokhmah, S., & Muslihah, I. (2020). Comparison of Naive Bayes and K-NN method on Tuition Fee Payment Overdue Prediction. International Journal of Computer and Information System (IJCIS), 1(1).
13. Muqorobin, Muqorobin, Siti Rokhmah, Isnawati Muslihah, and Nendy Akbar Rozaq Rais. "Classification of Community Complaints Against Public Services on Twitter." International Journal of Computer and Information System (IJCIS) 1, no. 1 (2020).
DOI: https://doi.org/10.29040/ijcis.v1i1.7
Article Metrics
Abstract view : 768 timesPDF - 489 times
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License