2021
DOI: 10.1007/978-981-16-6554-7_80
|View full text |Cite
|
Sign up to set email alerts
|

Research on MySQL Database Recovery and Forensics Based on Binlog

Abstract: MySQL database is more and more widely used, and the problems of data recovery and forensics brought about by it have become more and more people's attention. The current common method of MySQL data recovery is to analyze the redo log. However, the redo log is based on the InnodDB storage engine. The storage engine in MySQL is not only InnoDB, so this method is not universal. In MySQL, there is also a very important log, which is a binary log with high efficiency and flexibility. This article analyzes the stru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…Specifically, motivated by audit log requirements, Azemović and Mušić (2009) describe a model that ensures an effective and efficient tamper detection based on SQL triggers to collect audit logs. They implement hashing [Hauger and Olivier 2018] NoSQL databases -Examines whether NoSQL databases have security features that leave relevant traces so an accurate forensic attribution can be conducted RECV [Wagner et al 2019] Database forensics artifacts -Develops a framework for representing and searching database forensic artifacts and introduces a new storage format, called Database Forensic File Format PERF [Liebler et al 2019] Artifact lookup strategies -Analyzes articles previously written on the topic, either as a citation, proposal or review of the methods RECV [Choi et al 2021] Forensic Recovery -Introduces a method of recovering deleted data for use in MySQL SEC [Alfadli et al 2021] Database Forensics -Propose a unified identification model applicable to the database forensic field, which integrates and harmonizes all exiting identification processes into a single abstract model SEC [Bašić et al 2021] SQL trigger, auditing -Propose an effective in-database auditing subsystem used as a base for access control, intrusion detection, fraud detection, and others SEC [Andrade et al 2021] Internal changes -Present a new system that allows to track the changes of internal databases used by Universal Windows Platform RECV [Zhang et al 2022] MySQL binlog -Introduce a method for data recovery using the binary log of the MYSQL database RECV [Gupta et al 2022] Database as a Service -Propose a communication-efficient and information-theoretically secure system for aggregation queries on Database as a Service PERF: Performance analysis. SEC: Security rules.…”
Section: Dbms Publications Analysis and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Specifically, motivated by audit log requirements, Azemović and Mušić (2009) describe a model that ensures an effective and efficient tamper detection based on SQL triggers to collect audit logs. They implement hashing [Hauger and Olivier 2018] NoSQL databases -Examines whether NoSQL databases have security features that leave relevant traces so an accurate forensic attribution can be conducted RECV [Wagner et al 2019] Database forensics artifacts -Develops a framework for representing and searching database forensic artifacts and introduces a new storage format, called Database Forensic File Format PERF [Liebler et al 2019] Artifact lookup strategies -Analyzes articles previously written on the topic, either as a citation, proposal or review of the methods RECV [Choi et al 2021] Forensic Recovery -Introduces a method of recovering deleted data for use in MySQL SEC [Alfadli et al 2021] Database Forensics -Propose a unified identification model applicable to the database forensic field, which integrates and harmonizes all exiting identification processes into a single abstract model SEC [Bašić et al 2021] SQL trigger, auditing -Propose an effective in-database auditing subsystem used as a base for access control, intrusion detection, fraud detection, and others SEC [Andrade et al 2021] Internal changes -Present a new system that allows to track the changes of internal databases used by Universal Windows Platform RECV [Zhang et al 2022] MySQL binlog -Introduce a method for data recovery using the binary log of the MYSQL database RECV [Gupta et al 2022] Database as a Service -Propose a communication-efficient and information-theoretically secure system for aggregation queries on Database as a Service PERF: Performance analysis. SEC: Security rules.…”
Section: Dbms Publications Analysis and Discussionmentioning
confidence: 99%
“…As a result, they propose a method to recover deleted tables and records, and make the solution available as an open-source tool. Zhang et al (2022) analyze the structure of the DBMS MySQL binary log and use the binlog to restore the database. They compare the mysqlbinlog tool and its defects, use Python to write a better binlog analysis tool, generate standard SQL, and have a rollback function to better recover data.…”
Section: Dbms Publications Analysis and Discussionmentioning
confidence: 99%
“…Secondly, under the background of the combination of machine learning and education, team spirit and team cooperation ability are still the important quality requirements of the society for college talents. Therefore, college counsellors pay attention to cultivating students' team spirit in extracurricular sports activities and improving students' social adaptability, which is of great significance to improving students' comprehensive quality and promoting their employment (Zhang et al, 2022).…”
Section: Introductionmentioning
confidence: 99%