Implementation and overhead analysis of a log-based intrusion recovery module on Linux file system

被引:0
|
作者
Lee, JK [1 ]
Kim, HS [1 ]
机构
[1] Chungnam Natl Univ, Dept Comp Sci & Engn, Taejon 305764, South Korea
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Most people always want to get reliable information, even if there are intrusions that illegitimate hacker : damages to,file systems through operations modifying, appending, and deleting-files. To accomplish this, We need the recovery function with transparent to user and return to As former state. This paper proposes. design and implementation of a Log-Based Intrusion Recovery Module (LBIRM). It can keep the previous contents of designated files as a chain of logs and recover the damaged file by using the log.
引用
收藏
页码:548 / 552
页数:5
相关论文
共 50 条
  • [41] Early Exploration of Using ChatGPT for Log-based Anomaly Detection on Parallel File Systems Logs
    Egersdoerfer, Chris
    Zhang, Di
    Dai, Dong
    PROCEEDINGS OF THE 32ND INTERNATIONAL SYMPOSIUM ON HIGH-PERFORMANCE PARALLEL AND DISTRIBUTED COMPUTING, HPDC 2023, 2023, : 315 - 316
  • [42] Log-Based Rollback Recovery without Checkpoints of Shared Memory in Software DSM
    Soyeon Park
    Seung Ryoul Maeng
    The Journal of Supercomputing, 2006, 35 : 141 - 154
  • [43] MapReduce based Log File Analysis for System Threats and Problem Identification
    Vernekar, Sumeet S.
    Buchade, Amar
    PROCEEDINGS OF THE 2013 3RD IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2013, : 831 - 835
  • [44] Falcon: A Practical Log-based Analysis Tool for Distributed Systems
    Neves, Francisco
    Machado, Nuno
    Pereira, Jose
    2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2018, : 534 - 541
  • [45] New log-based approach to independent recovery in distributed shared memory systems
    Lin, Jenn-Wei
    Kuo, Sy-Yen
    2000, IIS, Taipei, Taiwan (16)
  • [46] Nurses' Actual Usage of EMRs: An Access Log-Based Analysis
    Kajimura, Ayako
    Takemura, Tadamasa
    Hikita, Tomoko
    Fujita, Kenichiro
    Yoshihara, Waon
    Hashiya, Akane
    Kuroda, Tomohiro
    NURSING INFORMATICS 2016: EHEALTH FOR ALL: EVERY LEVEL COLLABORATION - FROM PROJECT TO REALIZATION, 2016, 225 : 858 - 859
  • [47] Log Based Recovery with Low Overhead for Mobile Computing Systems
    Singh, Awadhesh Kumar
    Kaur, Parmeet
    COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 637 - +
  • [48] A Comparative Evaluation of Log-Based Process Performance Analysis Techniques
    Milani, Fredrik
    Maggi, Fabrizio M.
    BUSINESS INFORMATION SYSTEMS (BIS 2018), 2018, 320 : 371 - 383
  • [49] A Log-Based Analysis of the Associations Between Creativity and Computational Thinking
    Israel-Fishelson, Rotem
    Hershkovitz, Arnon
    Eguiluz, Andoni
    Garaizar, Pablo
    Guenaga, Mariluz
    JOURNAL OF EDUCATIONAL COMPUTING RESEARCH, 2021, 59 (05) : 926 - 959
  • [50] Applicability analysis of log-based process similarity computing method
    Lin Z.
    Zeng Q.
    Duan H.
    Lu F.
    Zhou C.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (04): : 920 - 928