Title :
Study of Log File Dispersion Management Method
Author :
Etoh, Fumiharu ; Takahashi, Kenichi ; Hori, Yoshiaki ; Sakurai, Kouichi
Author_Institution :
Inf. Security Lab., Inst. of Syst., Inf. Technol. & Nanotechnol., Fukuoka, Japan
Abstract :
In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.
Keywords :
computer forensics; cryptography; file organisation; active event; hash values; log file dispersion management method; log files; log information; operation event; Digital forensics; Dispersion; Radiation detectors; Redundancy; Security; Servers; Transmission line measurements; digital forensics; file distribution; hash value; log file;
Conference_Titel :
Applications and the Internet (SAINT), 2010 10th IEEE/IPSJ International Symposium on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-7526-1
Electronic_ISBN :
978-0-7695-4107-5
DOI :
10.1109/SAINT.2010.104