A secure virtualized logging scheme for digital forensics in comparison with kernel module approach

Bin Hui Chou, Kohei Tatara, Taketoshi Sakuraba, Yoshiaki Hori, Kouichi Sakurai

研究成果: 書籍/レポート タイプへの寄稿会議への寄与

4 被引用数 (Scopus)

抄録

Digital forensics encompasses the process of identifying the perpetrator and the criminal method by analyzing the logs generated in the computer. Log files record the activities of the computer and by reading them one can know what kind of event happened at a certain time. Therefore, secure logs with the integrity property are essential. In this paper, we discuss two approaches to achieve the integrity of logsthe kernel module and virtualization, and compare them. Although virtualization is more inefficient in performance than the kernel module, it provides more security properties for logs. Thus, we then focus on the virtualization approach with a detailed proposal, which describes ways to preserve logs without tampering and deletion.

本文言語英語
ホスト出版物のタイトルProceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008
ページ421-426
ページ数6
DOI
出版ステータス出版済み - 2008
イベント2nd International Conference on Information Security and Assurance, ISA 2008 - Busan, 韓国
継続期間: 4月 24 20084月 26 2008

出版物シリーズ

名前Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008

その他

その他2nd International Conference on Information Security and Assurance, ISA 2008
国/地域韓国
CityBusan
Period4/24/084/26/08

!!!All Science Journal Classification (ASJC) codes

  • コンピュータ ネットワークおよび通信
  • 情報システムおよび情報管理
  • 電子工学および電気工学
  • 通信

フィンガープリント

「A secure virtualized logging scheme for digital forensics in comparison with kernel module approach」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル