Implementation and overhead analysis of a log-based intrusion recovery module on Linux file system

被引:0
|
作者
Lee, JK [1 ]
Kim, HS [1 ]
机构
[1] Chungnam Natl Univ, Dept Comp Sci & Engn, Taejon 305764, South Korea
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most people always want to get reliable information, even if there are intrusions that illegitimate hacker : damages to,file systems through operations modifying, appending, and deleting-files. To accomplish this, We need the recovery function with transparent to user and return to As former state. This paper proposes. design and implementation of a Log-Based Intrusion Recovery Module (LBIRM). It can keep the previous contents of designated files as a chain of logs and recover the damaged file by using the log.
引用
收藏
页码:548 / 552
页数:5
相关论文
共 50 条
  • [1] The linux implementation of a log-structured file system
    NTT Cyber Space Laboratories, NTT Corporation, 1-1 Hikari-no-oka, Yokosuka-shi, Kanagawa, 239-0847, Japan
    Oper Syst Rev ACM, 2006, 3 (102-107):
  • [2] Log-based Intrusion Detection for MANET
    Alattar, Mouhannad
    Sailhan, Francoise
    Bourgeois, Julien
    2012 8TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2012, : 697 - 702
  • [3] The design of efficient initialization and crash recovery for log-based file systems over flash memory
    National Taiwan University
    不详
    不详
    不详
    不详
    ACM Trans. Storage, 2006, 4 (449-467):
  • [4] Design and Implementation of Hierarchical File System Based on Embedded Linux
    Huang, Xiaobo
    Yin, Kegong
    Yun, Yonggang
    2ND INTERNATIONAL SYMPOSIUM ON COMPUTER NETWORK AND MULTIMEDIA TECHNOLOGY (CNMT 2010), VOLS 1 AND 2, 2010, : 629 - 631
  • [5] A Hybrid Intrusion Detection Model for Web Log-Based Attacks
    Zou, Junwei
    Tao, Dan
    Yu, Jing
    JOURNAL OF INTERNET TECHNOLOGY, 2017, 18 (04): : 887 - 895
  • [6] Log-based recovery scheme for executing untrusted programs
    Lue, Hui-Jun
    Leng, Shu-Zhen
    PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2136 - +
  • [7] WiFi LOG-BASED STUDENT BEHAVIOR ANALYSIS AND VISUALIZATION SYSTEM
    Chen, Fan
    Jing, Changfeng
    Zhang, Hongyang
    Lv, Xinxin
    XXIV ISPRS CONGRESS IMAGING TODAY, FORESEEING TOMORROW, COMMISSION IV, 2022, 43-B4 : 493 - 499
  • [8] Phaeton: A log-based architecture for high performance file server design
    Chin, CC
    Tung, CK
    Tsai, SR
    PACIFIC RIM INTERNATIONAL SYMPOSIUM ON FAULT-TOLERANT SYSTEMS, PROCEEDINGS, 1997, : 28 - 33
  • [9] Log-based middleware server recovery with transaction support
    Rui Wang
    Betty Salzberg
    David Lomet
    The VLDB Journal, 2011, 20 : 347 - 370
  • [10] Log-based middleware server recovery with transaction support
    Wang, Rui
    Salzberg, Betty
    Lomet, David
    VLDB JOURNAL, 2011, 20 (03): : 347 - 370