Restraining and repairing file system damage through file integrity control

被引:0
|
作者
Serafim, VD [1 ]
Weber, RF [1 ]
机构
[1] Univ Fed Rio Grande Sul, Inst Informat, PPGC, Porto Alegre, RS, Brazil
关键词
file integrity; survivable systems; intrusion tolerance; cryptographic hash; Linux kernel;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, many security researches focus on survivable or intrusion-tolerant systems, which are not conceived to be invulnerable, but rather to be able to withstand the impact of an attack and continue providing critical services despite ongoing attacks. We join this fast-growing research community and use this article to present a solution of file integrity control which is able to detect unauthorized file system modifications as fast as possible and repair them in order to keep the system's integrity, availability and confidentiality. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:52 / 62
页数:11
相关论文
共 50 条
  • [1] Protecting the integrity of an entire file system
    Tomonori, F
    Masanori, O
    IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 95 - 105
  • [2] Modern approaches to file system integrity checking
    Kaczmarek, Jerzy
    Wrobel, Michal
    PROCEEDINGS OF THE 2008 1ST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY, 2008, : 403 - 406
  • [3] Eliminating duplication and ensuring file integrity in Multisyne: A multiagent system for ubiquitous file synchronization
    Niazi, Muaz
    Manzoor, Umar
    Ijaz, Kiran
    Summiya
    Saleem, Hina
    Proceedings of the INMIC 2005: 9th International Multitopic Conference - Proceedings, 2005, : 767 - 772
  • [4] A File Integrity Monitoring System Based on Virtual Machine
    Wang, Zhu
    Huang, Tao
    Wen, Sha
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 653 - 659
  • [5] A TOUR THROUGH THE UNIX FILE SYSTEM
    JOYCE, J
    BYTE, 1983, 8 (10): : 170 - &
  • [6] A parts-of-file file system
    Padioleau, Y
    Ridoux, O
    USENIX Association Proceedings of the General Track: 2005 UNENIX Annual Technical Conference, 2005, : 359 - 362
  • [7] File Integrity Monitor Scheduling Based on File Security Level Classification
    Abdullah, Zul Hilmi
    Udzir, Nur Izura
    Mahmod, Ramlan
    Samsudin, Khairulmizam
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 177 - +
  • [8] Real-Time Intrusion Detection of Insider Threats in Industrial Control System Workstations Through File Integrity Monitoring
    Al-Muntaser, Bakil
    Mohamed, Mohamad Afendee
    Tuama, Ammar Yaseen
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (06) : 326 - 333
  • [9] Iris: A Scalable Cloud File System with Efficient Integrity Checks
    Stefanov, Emil
    van Dijk, Marten
    Juels, Ari
    Oprea, Alina
    28TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2012), 2012, : 229 - 238
  • [10] File Deduplication with Cloud Storage File System
    Ku, Chan-I
    Luo, Guo-Heng
    Chang, Che-Pin
    Yuan, Shyan-Ming
    2013 IEEE 16TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2013), 2013, : 280 - 287