Adding Availability to Log Services of Untrusted Machines.

ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference(1999)

引用 18|浏览288
暂无评分
摘要
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering with information can be achieved using cryptographic functions that provide authenticity, integrity, and confidentiality. However, they cannot provide the prerequisite for any further information processing, i.e., information availability. In this case, fault tolerant strategies can be of great help improving information availability in case of accidental or deliberate deletion.In this paper we propose a system that increases log files availability in case of software deletion by reliably and efficiently distributing the logs on multiple independent machines. The proposed scheme is more efficient than simple replication, both from the storage space and the network bandwidth points of view. The proposed system has been implemented and its impact on performance has been measured. Since it operates as a postprocessor after log generation, the proposed system can be easily integrated with logging systems that provide various cryptographic functions for forensic purposes.
更多
查看译文
关键词
proposed system,information availability,critical system component,real time system monitoring,information processing,files availability,log generation,proposed scheme,uncorrupted log file,cryptographic function,Log Services,Untrusted Machines
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要