Monitor and Detect Suspicious Transactions With Database Forensic Analysis

Monitor and Detect Suspicious Transactions With Database Forensic Analysis

Harmeet Kaur Khanuja, Dattatraya Adane
Copyright: © 2018 |Pages: 23
DOI: 10.4018/JDM.2018100102
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The extensive usage of web has given rise to financially motivated illegal covert online transactions. So the digital investigators have approached databases for investigating undetected illegal transactions. The authors here have designed and developed a methodology to find the illegal financial transactions through the database logs. The objective is to monitor database transactions for detecting and reporting risk level of suspicious transactions. Initially, the process extracts SQL transactions from logs of different database systems, then transforms and loads them separately in uniform XML format which gives the transaction records and its metadata. The transaction records are processed with well-defined rules to get outliers present as suspicious transactions. This gives the initial belief of the transactions to be suspicious. The belief value of transactions is further rationalised using Dempster-Shafer's theory. This verifies the uncertainty and risk level of the suspected transactions to assure occurrences of fraud transactions.
Article Preview
Top

Introduction

The technological advancement and the globalization of online banking provisions for finance and the payment systems have widened the scope of concealing illegal money and easy mobility of funds across the borders. These are known as suspicious activities or illegal transactions incorporating money laundering. Theodosios Tsiakis et al. (2015) recommend the need to manage and regulate the risks calls for Information Technology Security Governance (ITSG) program as a means to deliver value business and mitigate Information Technology (IT) risks. Their objectives are to implement information security governance (ISG) approaches for e-banking through standards, guidelines on governance, risk management methods and internal controls for e-banking. Streff (2007) outlines the importance of IT security to banks which must comply with law and regulation of banks. D. Rafal et al. (2012) mentioned an illegal transaction of money is now a global problem which can undermine the integrity and stability of financial markets and financial institutions (FI). As per Reserve Bank of India (RBI, 2017), the Banks and FIs should exercise ongoing due diligence with respect to every customer and closely examine the transactions to ensure that they are consistent with the customer's profile and source of funds as per extant instructions. Palshikar et al. (2014) suggests that prevention, detection and control of money laundering are crucial for the financial security and risk management of financial institutions. Conversely, Anti-Money Laundering (AML, 2015) Transaction Monitoring systems produce large volumes of work items most of which do not result in quality investigations or actionable results.

To avert this government act like Sarbanes-Oxley (SOX, 2017) has given an immense impact on database auditing requirements. Patnaik et al. (2003) mentions that the survivability of database systems in case of information attacks depends exclusively on the logging mechanism. This process requires that the log must record all operations of every transaction and that the log should never be purge, but these results in enormous growth of the logs. They used logs based on transaction relationships and stored each segment as a separate file to access independently as required. As suggested by H. Khanuja et al. (2014), S. Raghavan (2013), H. Beyers et al. (2011), M. Olivier et al. (2012), database audit logs contain traces of information which can be used for investigations. These audit logs if administered and carefully monitored to record database activities, can contour suspicious and illegal behaviour acts. Thus, the monitoring systems and log collection must provide an audit trail of all the activities and access to sensitive business information.

To deal with this problem this research aims to pioneer database forensics by probing database systems and their native database audit logs for monitoring and reinstate evidences. Database forensics is a subset of application-based forensics, which identifies, preserves and analyses digital information within databases to produce evidence in a court of law. F. Kevvie (2009) said examining database artifacts is the most relevant to database investigations. The information obtained through it can be collected and preserved very safely and non-disruptively to analyze and confirm database intrusions. This also facilitates an investigator to retrace the actions of an intruder within a database server. According to D. Litchfield (2007), SQL operations leave plenty of forensic data onto database infrastructure in the Oracle server for forensic analysis. Thus, this article presents a very thorough discussion of a framework which uses database audit logs for detecting suspicious transactions in a financial scenario. Since the database systems have their own database auditing capabilities so two databases viz; Oracle and MS SQL databases were experimented for this research work.

Complete Article List

Search this Journal:
Reset
Volume 35: 1 Issue (2024)
Volume 34: 3 Issues (2023)
Volume 33: 5 Issues (2022): 4 Released, 1 Forthcoming
Volume 32: 4 Issues (2021)
Volume 31: 4 Issues (2020)
Volume 30: 4 Issues (2019)
Volume 29: 4 Issues (2018)
Volume 28: 4 Issues (2017)
Volume 27: 4 Issues (2016)
Volume 26: 4 Issues (2015)
Volume 25: 4 Issues (2014)
Volume 24: 4 Issues (2013)
Volume 23: 4 Issues (2012)
Volume 22: 4 Issues (2011)
Volume 21: 4 Issues (2010)
Volume 20: 4 Issues (2009)
Volume 19: 4 Issues (2008)
Volume 18: 4 Issues (2007)
Volume 17: 4 Issues (2006)
Volume 16: 4 Issues (2005)
Volume 15: 4 Issues (2004)
Volume 14: 4 Issues (2003)
Volume 13: 4 Issues (2002)
Volume 12: 4 Issues (2001)
Volume 11: 4 Issues (2000)
Volume 10: 4 Issues (1999)
Volume 9: 4 Issues (1998)
Volume 8: 4 Issues (1997)
Volume 7: 4 Issues (1996)
Volume 6: 4 Issues (1995)
Volume 5: 4 Issues (1994)
Volume 4: 4 Issues (1993)
Volume 3: 4 Issues (1992)
Volume 2: 4 Issues (1991)
Volume 1: 2 Issues (1990)
View Complete Journal Contents Listing