Forensic Analysis for Monitoring Database Transactions

作者: Harmeet Kaur Khanuja , Dattatraya S. Adane

DOI: 10.1007/978-3-662-44966-0_19

关键词: Database auditMoney launderingComputer securityComputer scienceFinancial transactionDatabaseUnit (housing)Database forensicsDempster–Shafer theoryFinancial intelligenceDatabase transaction

摘要: Database forensics aids in the qualification and investigation of databases facilitates a forensic investigator to prove suspected crime which can be used prevent illegitimate banking transactions. The banks deals public money but unfortunately are becoming vulnerable by receiving illegal form legitimate business. absence any preventive measures monitor such scam would perilous some day. If they violate relevant laws regulatory guidelines unknowingly keep raising Money Laundering practices their system. In this article we propose methodology for private have ongoing monitoring system as per Reserve Bank India (RBI) financial transactions will check database audit logs on continuous basis marking if any. These then precisely analyzed verified with Dempster Shafer Theory Evidence generate reports automatically required Financial Intelligence Unit.

参考文章(23)
Alan Bundy, Lincoln Wallen, Dempster-Shafer Theory Springer, Berlin, Heidelberg. pp. 27- 28 ,(1984) , 10.1007/978-3-642-96868-6_52
Rajendra P. Srivastava, Theodore J. Mock, Lei Gao, The Dempster-Shafer Theory: An Introduction and Fraud Risk Assessment Illustration Australian Accounting Review. ,vol. 21, pp. 282- 291 ,(2011) , 10.1111/J.1835-2561.2011.00135.X
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
KARI SENTZ, SCOTT FERSON, Combination of Evidence in Dempster-Shafer Theory Other Information: PBD: 1 Apr 2002. ,(2002) , 10.2172/800792
Richard T. Snodgrass, Kyriacos Eleftheriou Pavlou, Database forensics in the service of information accountability The University of Arizona.. ,(2012)
Kyriacos E. Pavlou, Richard T. Snodgrass, DRAGOON: An Information Accountability System for High-Performance Databases 2012 IEEE 28th International Conference on Data Engineering. pp. 1329- 1332 ,(2012) , 10.1109/ICDE.2012.139
Sriram Raghavan, Digital forensic research: current state of the art CSI Transactions on ICT. ,vol. 1, pp. 91- 114 ,(2013) , 10.1007/S40012-012-0008-7
Kyriacos E. Pavlou, Richard T. Snodgrass, Forensic analysis of database tampering ACM Transactions on Database Systems. ,vol. 33, pp. 1- 47 ,(2008) , 10.1145/1412331.1412342
Su-Nan Wang, Jian-Gang Yang, A Money Laundering Risk Evaluation Method Based on Decision Tree international conference on machine learning and cybernetics. ,vol. 1, pp. 283- 286 ,(2007) , 10.1109/ICMLC.2007.4370155