{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T21:13:07Z","timestamp":1764364387576},"reference-count":39,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,1]]},"abstract":"<p>The extensive usage of web has given rise to financially motivated illegal covert online transactions. So the digital investigators have approached databases for investigating undetected illegal transactions. The authors here have designed and developed a methodology to find the illegal financial transactions through the database logs. The objective is to monitor database transactions for detecting and reporting risk level of suspicious transactions. Initially, the process extracts SQL transactions from logs of different database systems, then transforms and loads them separately in uniform XML format which gives the transaction records and its metadata. The transaction records are processed with well-defined rules to get outliers present as suspicious transactions. This gives the initial belief of the transactions to be suspicious. The belief value of transactions is further rationalised using Dempster-Shafer's theory. This verifies the uncertainty and risk level of the suspected transactions to assure occurrences of fraud transactions.<\/p>","DOI":"10.4018\/jdm.2018100102","type":"journal-article","created":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T11:53:37Z","timestamp":1554897217000},"page":"28-50","source":"Crossref","is-referenced-by-count":6,"title":["Monitor and Detect Suspicious Transactions With Database Forensic Analysis"],"prefix":"10.4018","volume":"29","author":[{"given":"Harmeet Kaur","family":"Khanuja","sequence":"first","affiliation":[{"name":"MMCOE, SPPU, Maharashtra, India"}]},{"given":"Dattatraya","family":"Adane","sequence":"additional","affiliation":[{"name":"Shri Ramdeobaba College of Engineering and Management, Nagpur, India"}]}],"member":"2432","reference":[{"key":"JDM.2018100102-0","unstructured":"Al Hamad, H. A. (2017). A literature Survey on Conversion between Relational and XML Models. In 2N\u1d48 International Computer Sciences and Informatics Conference (ICSIC 2017), Jordan (pp. 217-222)."},{"key":"JDM.2018100102-1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2011.29"},{"key":"JDM.2018100102-2","unstructured":"AML. (2015). The 5 Most Common AML Compliance Program Deficiencies. Retrieved from https:\/\/www.trulioo.com\/blog\/the-5-most-common-aml-compliance-program-deficiencies\/"},{"key":"JDM.2018100102-3","first-page":"89","article-title":"Assembling metadata for database forensics.","author":"H.Beyers","year":"2011","journal-title":"IFIP International Conference on Digital Forensics"},{"key":"JDM.2018100102-4","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-015-0276-9"},{"key":"JDM.2018100102-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2018.11.039"},{"key":"JDM.2018100102-6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33962-2_19"},{"key":"JDM.2018100102-7","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2012010103"},{"key":"JDM.2018100102-8","author":"H.Jiawei","year":"2012","journal-title":"Data Mining: Concepts and Techniques"},{"issue":"17","key":"JDM.2018100102-9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.5120\/19004-0502","article-title":"A survey on outlier detection in financial transactions.","volume":"108","author":"P.Kanhere","year":"2014","journal-title":"International Journal of Computers and Applications"},{"key":"JDM.2018100102-10","author":"F.Kevvie","year":"2009","journal-title":"SQL Server Forensic Analysis"},{"key":"JDM.2018100102-11","doi-asserted-by":"publisher","DOI":"10.1109\/ICMeCG.2011.50"},{"key":"JDM.2018100102-12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44966-0_19"},{"issue":"16","key":"JDM.2018100102-13","article-title":"Data mining model for money laundering detection in financial domain.","volume":"85","author":"M.Kharote","year":"2014","journal-title":"International Journal of Computers and Applications"},{"key":"JDM.2018100102-14","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2014.03.001"},{"key":"JDM.2018100102-15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.66"},{"key":"JDM.2018100102-16","author":"D.Litchfield","year":"2007","journal-title":"Oracle forensics part 1: dissecting the redo logs"},{"key":"JDM.2018100102-17","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2011.5968986"},{"key":"JDM.2018100102-18","unstructured":"Lopez-Rojas, E. A., & Axelsson, S. (2012), Money laundering detection using synthetic data. In The 27th annual workshop of the Swedish Artificial Intelligence Society (SAIS), Linkpings Universitet, May 14-15 (pp. 33-40)."},{"key":"JDM.2018100102-19","doi-asserted-by":"publisher","DOI":"10.4018\/JDM.2017070102"},{"key":"JDM.2018100102-20","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-411474-6.00036-0"},{"key":"JDM.2018100102-21","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2008.04.001"},{"key":"JDM.2018100102-22","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2003040103"},{"key":"JDM.2018100102-23","doi-asserted-by":"crossref","unstructured":"Pavlou, K.E. & Snodgrass, R.T. (2008), Forensic analysis of database tampering. ACM Trans. Database Syst., 33(4), 30:1-30:47.","DOI":"10.1145\/1412331.1412342"},{"key":"JDM.2018100102-24","doi-asserted-by":"crossref","unstructured":"Perez, D. G., & Lavalle, M. M. (2011), Outlier detection applying an innovative user transaction modeling with automatic explanation. In Electronics,Robotics and Automotive Mechanics Conference (CERMA) IEEE 2011 (pp. 41-46).","DOI":"10.1109\/CERMA.2011.14"},{"key":"JDM.2018100102-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.04.003"},{"key":"JDM.2018100102-26","doi-asserted-by":"publisher","DOI":"10.1007\/s40012-012-0008-7"},{"key":"JDM.2018100102-27","doi-asserted-by":"publisher","DOI":"10.5539\/cis.v7n1p103"},{"key":"JDM.2018100102-28","year":"2017"},{"key":"JDM.2018100102-29","doi-asserted-by":"publisher","DOI":"10.4018\/IRMJ.2015070101"},{"key":"JDM.2018100102-30","doi-asserted-by":"crossref","DOI":"10.2172\/800792","author":"S. F. K.Sentz","year":"2002","journal-title":"Combination of evidences in Dempster-Shafer Theory"},{"key":"JDM.2018100102-31","unstructured":"Shafer, G. com. (1992). DST Dempster Shafer Theory. Retrieved from http:\/\/www.glennshafer.com\/assets\/downloads\/articles\/article48.pdf"},{"key":"JDM.2018100102-32","unstructured":"SOX. (2017). Sarbanes oxley audit requirements. Retrieved from http:\/\/www.sarbanes-oxley-101.com\/sarbanes-oxley-audits.htm"},{"key":"JDM.2018100102-33","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59904-171-1.ch004"},{"key":"JDM.2018100102-34","doi-asserted-by":"crossref","first-page":"3453","DOI":"10.1109\/ICMLC.2005.1527539","article-title":"Developing an intelligent data discriminating system of anti-money laundering based on SVM.","volume":"Vol. 6","author":"J.Tang","year":"2005","journal-title":"Proceedings of 2005 International Conference on Machine Learning and Cybernetics"},{"key":"JDM.2018100102-35","doi-asserted-by":"crossref","first-page":"13","DOI":"10.4018\/978-1-4666-2083-4.ch002","article-title":"IT Security Governance in E-banking","author":"T.Tsiakis","year":"2013","journal-title":"IT Security Governance Innovations: Theory and Research"},{"key":"JDM.2018100102-36","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-210-7.ch001"},{"key":"JDM.2018100102-37","doi-asserted-by":"publisher","DOI":"10.1109\/KAM.2009.221"},{"issue":"1-4","key":"JDM.2018100102-38","first-page":"23","article-title":"Credit card fraud detection using machine learning as data mining technique.","volume":"10","author":"O. S.Yee","year":"2018","journal-title":"Journal of Telecommunication Electronic and Computer Engineering"}],"container-title":["Journal of Database Management"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=227036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T20:25:19Z","timestamp":1651868719000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/JDM.2018100102"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"URL":"https:\/\/doi.org\/10.4018\/jdm.2018100102","relation":{},"ISSN":["1063-8016","1533-8010"],"issn-type":[{"value":"1063-8016","type":"print"},{"value":"1533-8010","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}