Study of log file dispersion management method

Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.

Original languageEnglish
Title of host publicationProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
Pages371-374
Number of pages4
DOIs
Publication statusPublished - Nov 29 2010
Event2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 - Seoul, Korea, Republic of
Duration: Jul 19 2010Jul 23 2010

Publication series

NameProceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010

Other

Other2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010
CountryKorea, Republic of
CitySeoul
Period7/19/107/23/10

Fingerprint

Redundancy

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Etoh, F., Takahashi, K., Hori, Y., & Sakurai, K. (2010). Study of log file dispersion management method. In Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010 (pp. 371-374). [5598040] (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010). https://doi.org/10.1109/SAINT.2010.104

Study of log file dispersion management method. / Etoh, Fumiharu; Takahashi, Kenichi; Hori, Yoshiaki; Sakurai, Kouichi.

Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. 2010. p. 371-374 5598040 (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Etoh, F, Takahashi, K, Hori, Y & Sakurai, K 2010, Study of log file dispersion management method. in Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010., 5598040, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010, pp. 371-374, 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, Republic of, 7/19/10. https://doi.org/10.1109/SAINT.2010.104
Etoh F, Takahashi K, Hori Y, Sakurai K. Study of log file dispersion management method. In Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. 2010. p. 371-374. 5598040. (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010). https://doi.org/10.1109/SAINT.2010.104
Etoh, Fumiharu ; Takahashi, Kenichi ; Hori, Yoshiaki ; Sakurai, Kouichi. / Study of log file dispersion management method. Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. 2010. pp. 371-374 (Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010).
@inproceedings{b0cfa507e96e40ca8b33e63ba4839503,
title = "Study of log file dispersion management method",
abstract = "In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.",
author = "Fumiharu Etoh and Kenichi Takahashi and Yoshiaki Hori and Kouichi Sakurai",
year = "2010",
month = "11",
day = "29",
doi = "10.1109/SAINT.2010.104",
language = "English",
isbn = "9780769541075",
series = "Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010",
pages = "371--374",
booktitle = "Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010",

}

TY - GEN

T1 - Study of log file dispersion management method

AU - Etoh, Fumiharu

AU - Takahashi, Kenichi

AU - Hori, Yoshiaki

AU - Sakurai, Kouichi

PY - 2010/11/29

Y1 - 2010/11/29

N2 - In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.

AB - In system equipment, a mechanism to prevent the manipulation or deletion of log information and log files by an attacker and to maintain the contents of log files are essential. Because log files include an active event and an operation event in the system equipment, these files are at risk of attacks such as file manipulation or deletion. In this paper, we propose a log file dispersion management method using hash values. It is possible to detect the manipulation or deletion of log information and log files and to reconstruct original log files. Further, this method has both redundancy and resistibility.

UR - http://www.scopus.com/inward/record.url?scp=78649285624&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=78649285624&partnerID=8YFLogxK

U2 - 10.1109/SAINT.2010.104

DO - 10.1109/SAINT.2010.104

M3 - Conference contribution

AN - SCOPUS:78649285624

SN - 9780769541075

T3 - Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010

SP - 371

EP - 374

BT - Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010

ER -