Linux 환경 데이터베이스의 메모리 공간에 대한 데이터 수집 방법 및 보안 위협

Vol. 35, No. 3, pp. 505-512, 6월. 2025
10.13089/JKIISC.2025.35.3.505, Full Text:
Keywords: database, In-Memory Database, memory
Abstract

Database technology has grown considerably, and its scope of use is expanding. The expansion of the scope of utilization is expanding in large-capacity real-time data processing and distributed computing environments. With the rapid development and increase in use of DB systems, new challenges are emerging in terms of data security. In particular, security threats in large-capacity real-time data processing systems are increasing, and it is important to ensure the safety of data processed in real-time in these systems. In this study, the memory area of the DBMS used by the Linux-based server is collected using Volatility 3, a memory analysis tool. Using the collected information, a method of collecting internal data through analysis of the memory area is suggested, and security threats that may occur in the memory space used by the database are analyzed.

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
손석훈 and 이덕규, "Data Collection Methods and Security Threats to Memory Space in Linux Environment Databases," Journal of The Korea Institute of Information Security and Cryptology, vol. 35, no. 3, pp. 505-512, 2025. DOI: 10.13089/JKIISC.2025.35.3.505.

[ACM Style]
손석훈 and 이덕규. 2025. Data Collection Methods and Security Threats to Memory Space in Linux Environment Databases. Journal of The Korea Institute of Information Security and Cryptology, 35, 3, (2025), 505-512. DOI: 10.13089/JKIISC.2025.35.3.505.