DocumentCode :
2517978
Title :
Study of Log File Dispersion Management Method
Author :
Etoh, Fumiharu ; Takahashi, Kenichi ; Hori, Yoshiaki ; Sakurai, Kouichi
Author_Institution :
Inf. Security Lab., Inst. of Syst., Inf. Technol. & Nanotechnol., Fukuoka, Japan
fYear :
2010
fDate :
19-23 July 2010
Firstpage :
371
Lastpage :
374
Abstract :
In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.
Keywords :
computer forensics; cryptography; file organisation; active event; hash values; log file dispersion management method; log files; log information; operation event; Digital forensics; Dispersion; Radiation detectors; Redundancy; Security; Servers; Transmission line measurements; digital forensics; file distribution; hash value; log file;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-7526-1
Electronic_ISBN :
978-0-7695-4107-5
Type :
conf
DOI :
10.1109/SAINT.2010.104
Filename :
5598040
Link To Document :
بازگشت